{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:43:06Z","timestamp":1730288586391,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/percom.2009.4912894","type":"proceedings-article","created":{"date-parts":[[2009,5,11]],"date-time":"2009-05-11T14:19:49Z","timestamp":1242051589000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["An XML based access control architecture for pervasive computing"],"prefix":"10.1109","author":[{"given":"Mohammad M.","family":"Molla","sequence":"first","affiliation":[]},{"given":"Praveen","family":"Madiraju","sequence":"additional","affiliation":[]},{"given":"Srilaxmi","family":"Malladi","sequence":"additional","affiliation":[]},{"given":"Sheikh Iqbal","family":"Ahamed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/11574781_13"},{"journal-title":"Schema Based XML Security RBAC Approach","year":"2003","author":"zhang","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063994"},{"year":"0","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276924"},{"key":"15","article-title":"access control to information in pervasive computing environments","volume":"9","author":"hengartner","year":"2003","journal-title":"Proc Workshop Hot Topics in Operating Systems (HotOS '99)"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990047"},{"year":"0","key":"16"},{"key":"13","article-title":"a semantic ewallet to reconcile privacy and context awareness","author":"gandon","year":"2003","journal-title":"Tn Proceedings of 2nd International Semantic Web Conference (ISWC2003)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968569"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990046"},{"key":"12","article-title":"regulating access to xml documents","author":"gabillon","year":"2001","journal-title":"Working Conference on Database and Application Security"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.37"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015584805733"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1178618.1178621"},{"year":"0","key":"23"},{"year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300832"},{"journal-title":"OASIS extensible Access Control Markup Language (XACML) v2 0","year":"0","key":"26"},{"year":"0","key":"27"},{"year":"0","key":"28"},{"key":"29","article-title":"syd: a middleware testbed for collaborative applications over small heterogeneous devices and data stores","author":"prasad","year":"2004","journal-title":"Proceedings of ACM\/IFIP\/USENIX 5th International Middleware Conference"},{"key":"3","article-title":"xml path language (xpath) 2.0","author":"berglund","year":"2004","journal-title":"W3C Working Draft"},{"year":"0","key":"2"},{"key":"10","first-page":"554","article-title":"role-based access control","author":"ferraiolo","year":"1992","journal-title":"Proc of the 15th National Computer Security Conference"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2003.1192774"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099577"},{"year":"0","key":"7"},{"key":"6","article-title":"an access control model for quering xml data","author":"capitini","year":"2005","journal-title":"Proceedings of the 2005 workshop on Secure web services"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2828"},{"journal-title":"Computer Security","year":"2002","author":"bishop","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"article-title":"secure and selective dissemination of xml documents. tissec","year":"2002","author":"bertino","key":"4"},{"key":"9","article-title":"role-based access control: features and motivations","author":"ferraiolo","year":"1995","journal-title":"Proceedings Annual Computer Security Applications Conference"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007634"}],"event":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2009,3,9]]},"location":"Galveston, TX, USA","end":{"date-parts":[[2009,3,13]]}},"container-title":["2009 IEEE International Conference on Pervasive Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4906860\/4912739\/04912894.pdf?arnumber=4912894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:30:37Z","timestamp":1489768237000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4912894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/percom.2009.4912894","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}