{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:50:37Z","timestamp":1729648237263,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/smartcomp.2016.7501684","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T19:01:03Z","timestamp":1469559663000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Context-Sensitive Policy Based Security in Internet of Things"],"prefix":"10.1109","author":[{"given":"Prajit Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Sandeep","family":"Narayanan","sequence":"additional","affiliation":[]},{"given":"Nitin Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Karuna","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Finin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref11","article-title":"Polish teen derails tram after hacking train network","volume":"11","author":"leyden","year":"2008","journal-title":"The Register"},{"key":"ref12","first-page":"129","article-title":"Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses","author":"halperin","year":"2008","journal-title":"Security and Privacy 2008 SP 2008 IEEE Symposium on"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref16","article-title":"Using data analyticsto detect anomalous states in vehicles","author":"narayanan","year":"2015","journal-title":"arXiv preprint arXiv 1512 00327"},{"key":"ref17","article-title":"Oasis extensible access control 2 markup language (xacml) 3","author":"godik","year":"2002","journal-title":"Tech Rep Technical Report"},{"key":"ref18","article-title":"Rei: A policy language for the me-centric project","author":"lalana","year":"2002","journal-title":"Port Technology"},{"key":"ref19","article-title":"The kaos policy services framework","author":"bradshaw","year":"2013","journal-title":"Proc 8th Cyber Security and Information Intelligence ResearchWorkshop"},{"journal-title":"Google","article-title":"Mark up the world using beacons","year":"2016","key":"ref28"},{"article-title":"Shock at the wheel: your jeep can be hacked while driving down the road","year":"2015","author":"kochetkova","key":"ref4"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1609\/aimag.v36i2.2584","article-title":"Platys: From position to place-oriented mobile computing","volume":"36","author":"zavala","year":"2015","journal-title":"AI Magazine"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6120048"},{"article-title":"Gartner's 2015 hype cycle for emerging technologies identifies the computing innovations that organizations should monitor","year":"2015","author":"gartner","key":"ref6"},{"journal-title":"BMW","article-title":"Gartner's 2015 hype cycle for emerging technologies identifies the computing innovations that organizations should monitor","year":"2013","key":"ref29"},{"article-title":"100,000 refrigerators and other home appliances hacked to perform cyber attack","year":"2014","author":"khandelwal","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2004.23"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2004.1331732"},{"article-title":"Stress-free parking","year":"2015","author":"eddy","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2008","DOI":"10.1007\/978-0-387-39940-9_1073","article-title":"Owl: Web ontology language","author":"bechhofer","year":"2009","journal-title":"Encyclopedia of Database Systems"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/2845145","article-title":"Prospects for the internet of things","volume":"22","author":"cerf","year":"2015","journal-title":"XRDS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377849"},{"key":"ref22","article-title":"A unified attribute-based access control model covering dac, mac and rbac","author":"jin","year":"2012","journal-title":"Proceedings of 26th Annual IFIP WG 11 3 Working Conference on Data and Applications Security and Privacy (DBSec 2012)"},{"journal-title":"NIST NIST CPS 2016","year":"0","key":"ref21"},{"journal-title":"W3C Recommendation","year":"0","author":"dean","key":"ref24"},{"article-title":"Attribute-based access control models and implementation im cloud infrastructure as a service","year":"2014","author":"jin","key":"ref23"},{"first-page":"237","year":"0","author":"seitz","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2016.16"}],"event":{"name":"2016 IEEE International Conference on Smart Computing (SMARTCOMP)","start":{"date-parts":[[2016,5,18]]},"location":"St Louis, MO, USA","end":{"date-parts":[[2016,5,20]]}},"container-title":["2016 IEEE International Conference on Smart Computing (SMARTCOMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7499653\/7501656\/07501684.pdf?arnumber=7501684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T10:10:24Z","timestamp":1600942224000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7501684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/smartcomp.2016.7501684","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}