{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:54:16Z","timestamp":1725566056455},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838337","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T15:03:46Z","timestamp":1406559826000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Sharing policies for multi-partner asset management in smart environments"],"prefix":"10.1109","author":[{"given":"Christos","family":"Parizas","sequence":"first","affiliation":[]},{"given":"Diego","family":"Pizzocaro","sequence":"additional","affiliation":[]},{"given":"Alun","family":"Preece","sequence":"additional","affiliation":[]},{"given":"Petros","family":"Zerfos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Abca Coalition Operations Handbook","year":"2008","key":"3"},{"key":"2","first-page":"1028","author":"su","year":"2011","journal-title":"Smart City and the Applications"},{"key":"10","article-title":"Intelligence, surveillance, and reconnaisance fusion for coalition operations","author":"pham","year":"2008","journal-title":"Proc 11th Fusion"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.384.0693"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950195"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982152"},{"key":"5","article-title":"Power to the edge: Command and control in the information age","author":"hayes","year":"2003","journal-title":"CCRP"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.419"},{"key":"9","first-page":"117","author":"firozabadi","year":"2004","journal-title":"A Framework for Contractual Resource Sharing in Coalitions"},{"key":"8","article-title":"Framework for role-based access control in group communication systems","author":"nita-rotaru","year":"2004","journal-title":"Proc of International Workshop on Security in Parallel and Distributed Systems"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838337.pdf?arnumber=6838337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T15:59:35Z","timestamp":1490284775000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838337","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}