{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:59:43Z","timestamp":1730285983782,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838391","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T15:03:46Z","timestamp":1406559826000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Sharing smart environment assets in dynamic multi-partner scenarios"],"prefix":"10.1109","author":[{"given":"Christos","family":"Parizas","sequence":"first","affiliation":[]},{"given":"Diego","family":"Pizzocaro","sequence":"additional","affiliation":[]},{"given":"Alun","family":"Preece","sequence":"additional","affiliation":[]},{"given":"Petros","family":"Zerfos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Intelligence, Surveillance, and Reconnaissance fusion for coalition operations","author":"pham","year":"2008","journal-title":"2008 11th International Conference on Information Fusion FUSION"},{"journal-title":"Chapter 1 A Survey of Mobility Models in Wireless Adhoc Networks","year":"2008","author":"bai","key":"17"},{"journal-title":"Summary of Controlled English","year":"2010","author":"mott","key":"22"},{"key":"18","first-page":"44","author":"bisdikian","year":"2012","journal-title":"Trust and Obfuscation Principles for Quality of Information in Emerging Pervasive Environments"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.25"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.72"},{"key":"13","first-page":"117","author":"firozabadi","year":"2004","journal-title":"A Framework for Contractual Resource Sharing in Coalitions"},{"key":"14","first-page":"852","volume":"25","author":"lupu","year":"1999","journal-title":"Conflicts in Policy-based Distributed Systems Management"},{"key":"11","article-title":"Framework for role-based access control in group communication systems","author":"nita-rotaru","year":"2004","journal-title":"Proc of International Workshop on Security in Parallel and Distributed Systems"},{"key":"12","first-page":"94","author":"qin","year":"2003","journal-title":"Concept-level Access Control for the Semantic Web"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982152"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838337"},{"journal-title":"NATO NEC C2 Maturity Model","year":"2010","author":"alberts","key":"20"},{"journal-title":"Abca Coalition Operations Handbook","year":"2008","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950195"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.384.0693"},{"key":"7","article-title":"Ad hoc smart environments","author":"govindan","year":"1999","journal-title":"Proceedings of the DARPA\/NIST Workshop on Smart Environments"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-011-0021-3"},{"key":"5","article-title":"Power to the edge: Command and control in the information age","author":"hayes","year":"2003","journal-title":"CCRP"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.419"},{"key":"9","first-page":"698105","volume":"6981","author":"pearson","year":"0","journal-title":"The Challenge of Sensor Information Processing and Delivery Within Network and Information Science Research"},{"key":"8","article-title":"A dynamic infrastructure for interconnecting disparate isr\/istar assets (the ita sensor fabric)","author":"wright","year":"2009","journal-title":"IEEE\/ISIF Fusion 2009 Conference"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838391.pdf?arnumber=6838391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:48:42Z","timestamp":1490298522000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838391","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}