{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:35:45Z","timestamp":1729629345569,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335056","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Access control for local personal smart spaces"],"prefix":"10.1109","author":[{"given":"Brian","family":"Greaves","sequence":"first","affiliation":[]},{"given":"Marijke","family":"Coetzee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref11","first-page":"830","article-title":"Study on the access control model","volume":"1","author":"quing-hai","year":"2011","journal-title":"Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC)"},{"key":"ref12","first-page":"4","article-title":"Context-based access control Model for smart space","volume":"1","author":"kashevnik","year":"2013","journal-title":"Cyber Conflict (CyCon) 2013 5th International Conference on"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/65.953229","article-title":"IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks","volume":"15","author":"bourgeois","year":"2001","journal-title":"Network IEEE"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/35.620533"},{"key":"ref15","first-page":"57","article-title":"An effective access control scheme for preventing permission leak in Android","author":"du","year":"2015"},{"key":"ref16","first-page":"156","article-title":"ChainDroid: safe and flexible access to protected Android resources based on call chain","author":"qin","year":"2013","journal-title":"Trust Security and Privacy in Computing and Communications (TrustCom) 2013 12th IEEE International Conference on"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"ref3","first-page":"256","article-title":"A security conscious service discovery framework in pervasive computing environments","author":"manaf","year":"2009","journal-title":"Mobile Ubiquitous Computing Systems Services and Technologies 2009 UBICOMM &#x2018;09 Third International Conference on"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2013.6617083"},{"journal-title":"Ubiquitous Computing Smart Devices Smart Environments and Smart Interaction","year":"2009","author":"poslad","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276923"},{"key":"ref7","first-page":"291","volume":"17","author":"coetzee","year":"2007","journal-title":"Web services access control framework architecture incorporating trust Internet Res"},{"key":"ref2","first-page":"485","article-title":"A personal smart space approach to realising ambient ecologies","volume":"8","author":"gallacher","year":"2012"},{"key":"ref1","first-page":"167","article-title":"Context aware mobile transactions","author":"adiba","year":"2004","journal-title":"Mobile Data Management 2004 Proceedings 2004 IEEE International Conference on"},{"key":"ref9","first-page":"557","article-title":"A trust-based access control model for virtual organisations","author":"dalziel","year":"2006","journal-title":"Grid and Cooperative Computing Workshops 2006 GCCW &#x2018;06 Fifth International Conference on"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335056.pdf?arnumber=7335056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:14:45Z","timestamp":1498263285000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335056","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}