{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:10:58Z","timestamp":1730214658456,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/dictap.2012.6215352","type":"proceedings-article","created":{"date-parts":[[2012,6,21]],"date-time":"2012-06-21T08:17:03Z","timestamp":1340266623000},"page":"208-213","source":"Crossref","is-referenced-by-count":3,"title":["Trust-aware access control: How recent is your transaction history?"],"prefix":"10.1109","author":[{"given":"Ali","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Abdullah","family":"Alnajem","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2009.03.002"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2006.06.015"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.05.043"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.04.003"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.07.049"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.100"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11628-009-0064-8"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2010.48"},{"journal-title":"Database Marketing Analyzing and Managing Customers","year":"2008","author":"blattberg","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133067"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.06.004"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.198"},{"key":"23","article-title":"Access control models based on trust","volume":"5","author":"shunan ma","year":"2011","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/0001-6918(92)90042-C"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s00267-002-2907-0"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1080\/00137919508903151"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579004"},{"journal-title":"Context-aware Access Control in Ubiquitous Computing (Craac)","year":"2010","author":"ahmed","key":"29"},{"journal-title":"Using Trust and Risk for Access Control in Global Computing","year":"2005","author":"dimmock","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25980-0_20"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2010.5558948"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"journal-title":"Trust and Trustworthiness","year":"2002","author":"hardin","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.408"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2006.25"},{"key":"4","first-page":"225","article-title":"Trustac: Trust-based access control for pervasive devices","author":"mendoza","year":"2005","journal-title":"SPC"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-1574-5"},{"journal-title":"Risk-aware Collaborative Downloading","year":"2010","author":"alnajem","key":"8"}],"event":{"name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","start":{"date-parts":[[2012,5,16]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2012,5,18]]}},"container-title":["2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209061\/6215333\/06215352.pdf?arnumber=6215352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:52:37Z","timestamp":1490104357000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6215352\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/dictap.2012.6215352","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}