{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:43:27Z","timestamp":1771699407549,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1145\/1063979.1064000","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"111-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["Context sensitive access control"],"prefix":"10.1145","author":[{"given":"R. J.","family":"Hulsebosch","sequence":"first","affiliation":[{"name":"Telematica Instituut, The Netherlands"}]},{"given":"A. H.","family":"Salden","sequence":"additional","affiliation":[{"name":"Telematica Instituut, The Netherlands"}]},{"given":"M. S.","family":"Bargh","sequence":"additional","affiliation":[{"name":"Telematica Instituut, The Netherlands"}]},{"given":"P. W. G.","family":"Ebben","sequence":"additional","affiliation":[{"name":"Telematica Instituut, The Netherlands"}]},{"given":"J.","family":"Reitsma","sequence":"additional","affiliation":[{"name":"Telematica Instituut, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2005,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30473-9_8"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of Ubicomp 2003 - Ubiqui-tous Computing","author":"Bardram J.E.","year":"2003","unstructured":"Bardram , J.E. , Kj\u00e6r , R.E. , and Pedersen , M . \u00f8. Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing . In Proceedings of Ubicomp 2003 - Ubiqui-tous Computing , Vol. 2864 of Lecture Notes in Computer Science . Springer-Verlag , Seattle, Washington, USA , 2003 , 107-123.]] Bardram, J.E., Kj\u00e6r, R.E., and Pedersen, M.\u00f8. Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing. In Proceedings of Ubicomp 2003 - Ubiqui-tous Computing, Vol. 2864 of Lecture Notes in Computer Science. Springer-Verlag, Seattle, Washington, USA, 2003, 107-123.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373258"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/876878.879314"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/977405.978631"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), 2004","author":"Zhang G.","year":"2004","unstructured":"Zhang , G. and Parashar , M . Context-Aware Dynamic Access Control for Pervasive Applications . In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), 2004 Western MultiConference (WMC), San Diego, CA, USA, Society for Modeling and Simulation International (SCS ), January 2004 .]] Zhang, G. and Parashar, M. Context-Aware Dynamic Access Control for Pervasive Applications. In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), 2004 Western MultiConference (WMC), San Diego, CA, USA, Society for Modeling and Simulation International (SCS), January 2004.]]"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/3-540-45518-3_16","volume-title":"Middleware","author":"Bacon J.","year":"2001","unstructured":"Bacon , J. , Moody , K. , and Yao , W . Access Control and Trust in the Use of Widely Distributed Services . In Middleware 2001 , volume 2218 of Lecture Notes in Computer Science , pages 295 -- 308 , Springer-Verlag , 2001.]] Bacon, J., Moody, K., and Yao, W. Access Control and Trust in the Use of Widely Distributed Services. In Middleware 2001, volume 2218 of Lecture Notes in Computer Science, pages 295--308, Springer-Verlag, 2001.]]"},{"key":"e_1_3_2_1_8_1","volume-title":"October","author":"Hada S.","year":"2000","unstructured":"Hada , S. and Kudo , M . XML Access Control Language: Provisional Authorization for XML Documents , October 2000 , Tokyo Research Laboratory, IBM Research .]] Hada, S. and Kudo, M. XML Access Control Language: Provisional Authorization for XML Documents, October 2000, Tokyo Research Laboratory, IBM Research.]]"},{"key":"e_1_3_2_1_9_1","unstructured":"XACML 1.0 Specification www.oasis-open.org\/committees\/download.php\/2406\/oasis-xacml-1.0.pdf.]]  XACML 1.0 Specification www.oasis-open.org\/committees\/download.php\/2406\/oasis-xacml-1.0.pdf.]]"},{"key":"e_1_3_2_1_10_1","unstructured":"Air Marshals Keep Close Eye on Travelers NewsMax Wires April 2004 Associated Press.]]  Air Marshals Keep Close Eye on Travelers NewsMax Wires April 2004 Associated Press.]]"},{"key":"e_1_3_2_1_11_1","volume-title":"The Washington Times","author":"Waterman S.","year":"2004","unstructured":"Waterman , S. TSA looking at new screening techniques , The Washington Times , 3 October 2004 .]] Waterman, S. TSA looking at new screening techniques, The Washington Times, 3 October 2004.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"Ambient Intelligence","author":"Salden A. H.","year":"2004","unstructured":"Salden , A. H. and Kempen , M . Sustainable Cybernetics Systems - Backbones of Ambient Intelligent Environments . In Remagnino, P., Foresti, G.L., and Ellis, T. (eds.), Ambient Intelligence , Springer , November 2004 .]] Salden, A. H. and Kempen, M. Sustainable Cybernetics Systems - Backbones of Ambient Intelligent Environments. In Remagnino, P., Foresti, G.L., and Ellis, T. (eds.), Ambient Intelligence, Springer, November 2004.]]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300834"},{"key":"e_1_3_2_1_14_1","first-page":"554","volume-title":"Proceedings of 15th NIST-NCSC National Computer Security Conference","author":"Ferraiolo D.","year":"1992","unstructured":"Ferraiolo , D. and Kuhn , D.R . Role-Based Access Controls . In Proceedings of 15th NIST-NCSC National Computer Security Conference , pages 554 - 563 , Baltimore, MD , October 13-16 1992 .]] Ferraiolo, D. and Kuhn, D.R. Role-Based Access Controls. In Proceedings of 15th NIST-NCSC National Computer Security Conference, pages 554-563, Baltimore, MD, October 13-16 1992.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009386.1010156"},{"key":"e_1_3_2_1_16_1","volume-title":"Computer Fraud & Security","author":"Denning D.E.","year":"1996","unstructured":"Denning , D.E. , and MacDoran , P.F. Location-Based Authentication: Grounding Cyberspace for Better Security . In Computer Fraud & Security . Elsevier Science Ltd . ( 1996 ).]] Denning, D.E., and MacDoran, P.F. Location-Based Authentication: Grounding Cyberspace for Better Security. In Computer Fraud & Security. Elsevier Science Ltd. (1996).]]"},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Computer Science","volume-title":"Proc. Eurocrypt","author":"Brands S.","year":"1993","unstructured":"Brands S. and Chaum , D . Distance-Bounding Protocols , Proc. Eurocrypt 1993 , Lecture Notes in Computer Science , no 765, Spring-Verlag, pp. 344--359.]] Brands S. and Chaum, D. Distance-Bounding Protocols, Proc. Eurocrypt 1993, Lecture Notes in Computer Science, no 765, Spring-Verlag, pp. 344--359.]]"},{"key":"e_1_3_2_1_18_1","unstructured":"Waters B. and Felten E. Proving the Location of Tamper Resistent Devices http:\/\/www.cs.princeton.edu\/~bwaters\/research\/location_proving.ps.]]  Waters B. and Felten E. Proving the Location of Tamper Resistent Devices http:\/\/www.cs.princeton.edu\/~bwaters\/research\/location_proving.ps.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of Network and Distributed System Security Conference, February 6-8; San Diego; CA; USA.","author":"Balfanz D.","year":"2002","unstructured":"Balfanz , D. , Smetters , D.K. , Stewart , P. , and Wong , H.C . Talking to Strangers: Authentication in Ad-Hoc Wireless Networks . In Proceedings of Network and Distributed System Security Conference, February 6-8; San Diego; CA; USA. 2002 .]] Balfanz, D., Smetters, D.K., Stewart, P., and Wong, H.C. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In Proceedings of Network and Distributed System Security Conference, February 6-8; San Diego; CA; USA. 2002.]]"},{"key":"e_1_3_2_1_22_1","volume-title":"Context Authentication Using Constraint Channels. Fourth IEEE Workshop on Mobile Computing Systems and Applications, June 20 - 21","author":"Kindberg T.","year":"2002","unstructured":"Kindberg , T. , Zhang , K. , and Shankar , N . Context Authentication Using Constraint Channels. Fourth IEEE Workshop on Mobile Computing Systems and Applications, June 20 - 21 , 2002 , Callicoon, New York, USA.]] Kindberg, T., Zhang, K., and Shankar, N. Context Authentication Using Constraint Channels. Fourth IEEE Workshop on Mobile Computing Systems and Applications, June 20 - 21, 2002, Callicoon, New York, USA.]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/633292.633453"},{"key":"e_1_3_2_1_24_1","volume-title":"UCL Internal Research Note.","author":"Musolesi M.","year":"2004","unstructured":"Musolesi , M. , Hailes , S. , and Mascolo , C . Prediction of Context Information Using Kalman Filter Theory , UCL Internal Research Note. June 2004 .]] Musolesi, M., Hailes, S., and Mascolo, C. Prediction of Context Information Using Kalman Filter Theory, UCL Internal Research Note. June 2004.]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.1316821"},{"key":"e_1_3_2_1_26_1","first-page":"161","volume-title":"Collaborative Context Recognition for Handheld Devices. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003","author":"M\u00e4ntyj\u00e4rvi J.","year":"2003","unstructured":"M\u00e4ntyj\u00e4rvi , J. , Himberg , J. , and Huuskonen , P . Collaborative Context Recognition for Handheld Devices. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003 ), pp. 161 -- 168 , Dallas-Fort Worth, Texas, USA , 2003 .]] M\u00e4ntyj\u00e4rvi, J., Himberg, J., and Huuskonen, P. Collaborative Context Recognition for Handheld Devices. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003), pp. 161--168, Dallas-Fort Worth, Texas, USA, 2003.]]"},{"key":"e_1_3_2_1_27_1","volume-title":"ERCIM News No 54, Special issue on Applications and Platforms for the Mobile User","author":"De Heer J.","year":"2003","unstructured":"De Heer , J. , Tokmakoff , A. , Eertink , H. , and Anijs , J . Uluru: Mobile Interactive Multimedia Experimental Service Environment . In ERCIM News No 54, Special issue on Applications and Platforms for the Mobile User , 2003 .]] De Heer, J., Tokmakoff, A., Eertink, H., and Anijs, J. Uluru: Mobile Interactive Multimedia Experimental Service Environment. In ERCIM News No 54, Special issue on Applications and Platforms for the Mobile User, 2003.]]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40010-3_20"},{"key":"e_1_3_2_1_29_1","volume-title":"RFC 3693","author":"Cuellar J.","year":"2004","unstructured":"Cuellar , J. , Morris , J. , Mulligan , D. , Peterson , D. , and Polk , D . Geopriv Requirements , RFC 3693 , IETF GeoPriv Working Group , February 2004 .]] Cuellar, J., Morris, J., Mulligan, D., Peterson, D., and Polk, D. Geopriv Requirements, RFC 3693, IETF GeoPriv Working Group, February 2004.]]"},{"key":"e_1_3_2_1_30_1","volume-title":"October","author":"Rosenberg J.","year":"2004","unstructured":"Rosenberg , J. The Extensible Markup Language (XML) Configuration Access Protocol (XCAP), draft-ietf-simple-xcap-04, work in progress , October 2004 .]] Rosenberg, J. The Extensible Markup Language (XML) Configuration Access Protocol (XCAP), draft-ietf-simple-xcap-04, work in progress, October 2004.]]"},{"key":"e_1_3_2_1_31_1","volume-title":"European Commission","author":"IST Advisory Group","year":"2002","unstructured":"IST Advisory Group , Trust , dependability , security and privacy for IST in FP6 , European Commission , 2002 , ftp:\/\/ftp.cordis.lu\/pub\/ist\/docs\/istag_kk4402464encfull.pdf]] IST Advisory Group, Trust, dependability, security and privacy for IST in FP6, European Commission, 2002, ftp:\/\/ftp.cordis.lu\/pub\/ist\/docs\/istag_kk4402464encfull.pdf]]"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/91.705512"}],"event":{"name":"SACMAT05: 10th ACM Symposium on Access Control Models and Technologies 2005","location":"Stockholm Sweden","acronym":"SACMAT05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the tenth ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1064000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1063979.1064000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:12Z","timestamp":1750263552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1064000"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":31,"alternative-id":["10.1145\/1063979.1064000","10.1145\/1063979"],"URL":"https:\/\/doi.org\/10.1145\/1063979.1064000","relation":{},"subject":[],"published":{"date-parts":[[2005,6]]},"assertion":[{"value":"2005-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}