{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:26:14Z","timestamp":1729610774036,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127510","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T11:34:31Z","timestamp":1330601671000},"page":"1448-1453","source":"Crossref","is-referenced-by-count":2,"title":["Risk Based Mobile Access Control (RiBMAC) policy framework"],"prefix":"10.1109","author":[{"given":"Jim","family":"Luo","sequence":"first","affiliation":[]},{"given":"Myong","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"63","article-title":"Context-Dependent Authentication and Access Control","author":"bertin","year":"2009","journal-title":"INetSec 2009-Open Research Problems in Network Security"},{"key":"15","article-title":"Context-Aware Dynamic Access Control for Pervasive Applications","author":"parashar","year":"0","journal-title":"Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference San Diego 2004"},{"key":"16","article-title":"Supporting location-based conditions in access control policies","author":"cremonini","year":"0","journal-title":"Proceedings of the 2006 ACM Symposium on Information computer and communications security"},{"key":"13","article-title":"A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments","author":"montanari","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"14","article-title":"Context-aware role-based access control in pervasive computing systems","author":"tripathi","year":"0","journal-title":"Proceedings of the 13th ACM Symposium on Access Control Models and Technologies 2008"},{"key":"11","article-title":"Role-based access control: Features and motivations","author":"cugini","year":"0","journal-title":"Proceedings of the Annual Computer Security Applications Conference Los Alamitos Calif 1995"},{"key":"12","article-title":"Attribute Based Access Control (ABAC) for Web Services","author":"tong","year":"0","journal-title":"Intl Conf on Web Services 2005"},{"key":"3","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MSP.2010.76","article-title":"Mobile Device Security","volume":"8","author":"michae","year":"2010","journal-title":"Security & Privacy"},{"journal-title":"New IPhone Hardware Encryption Not even Close to Hack Proof\"","year":"2010","author":"foresman","key":"2"},{"journal-title":"JailbreakMe Exploits Serious IPhone Security Flaw","year":"2010","author":"bradley","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"7","article-title":"Application Lockbox for Mobile Device Security","author":"kang","year":"0","journal-title":"8th International Conference on Information Technology New Generations 2011"},{"key":"6","first-page":"130","article-title":"From desktop to mobile: Examining the security experience","volume":"28","author":"furnellb","year":"0","journal-title":"Computers & Security"},{"journal-title":"Mobile Device Security - Emerging Threats Essential Strategies","year":"2011","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding Android Security","volume":"7","author":"ongtang","year":"2009","journal-title":"Security & Privacy"},{"journal-title":"Risk-adaptable Access Control (Radac)","year":"2010","author":"mcgraw","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495966"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127510.pdf?arnumber=6127510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:03:56Z","timestamp":1497956636000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127510","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}