{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:33:54Z","timestamp":1767339234680,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/percom.2003.1192774","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"489-496","source":"Crossref","is-referenced-by-count":79,"title":["Cerberus: a context-aware security scheme for smart spaces"],"prefix":"10.1109","author":[{"given":"J.","family":"Al-Muhtadi","sequence":"first","affiliation":[]},{"given":"A.","family":"Ranganathan","sequence":"additional","affiliation":[]},{"given":"R.","family":"Campbell","sequence":"additional","affiliation":[]},{"given":"M.D.","family":"Mickunas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The Gaia Authentication Architecture","author":"al-muhtadi","year":"2003","journal-title":"UIUC Technical Report (number pending)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(85)90002-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/28659.28685"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602298"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373258"},{"key":"ref15","article-title":"Generalized Role-Based Access Control for Securing Future Applications","author":"covington","year":"0","journal-title":"23rd National Information Systems Security Conference 2000"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/0470848693"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2002.1030861"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566772"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/643550.643558"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(78)90029-5"},{"key":"ref5","article-title":"GaiaOS: An Infrastructure for Active Spaces","author":"roman","year":"2001","journal-title":"University of Illinois at Urbana-Champaign Technical Report UIUCDCS-R-2001&#x2013;2224 UILU-ENG-2001&#x2013;1731"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0140-3664(94)90105-8"},{"key":"ref7","article-title":"Unified Login with Pluggable Authentication Modules (PAM)","author":"samar","year":"1995","journal-title":"RFC 86 0"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","article-title":"The Computer for the Twenty-First Century","volume":"265","author":"weiser","year":"0","journal-title":"Scientific American"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/2.237456"},{"key":"ref9","article-title":"Reflective Middleware: From Your Desk to Your Hand","author":"roman","year":"2001","journal-title":"IEEE Distributed Systems Online Special Issue on Reflective Middleware"}],"event":{"name":"First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003)","acronym":"PERCOM-03","location":"Fort Worth, TX, USA"},"container-title":["Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8487\/26747\/01192774.pdf?arnumber=1192774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T23:18:05Z","timestamp":1497568685000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/percom.2003.1192774","relation":{},"subject":[]}}