{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:09:53Z","timestamp":1725617393875},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,29]]},"DOI":"10.1145\/1161023.1161031","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"47-52","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Human-centric network security management"],"prefix":"10.1145","author":[{"given":"Ghita Kouadri","family":"Most\u00e9faoui","sequence":"first","affiliation":[{"name":"Fribourg University, Switzerland"}]},{"given":"Patrick","family":"Br\u00e9zillon","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Pierre et Marie Curie, France"}]}],"member":"320","published-online":{"date-parts":[[2006,9,29]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/11508373_5"},{"volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC).","author":"Covington M.","unstructured":"Covington , M. , Fogla , P. , Zhan , Z. , and Ahamad , M . A Context-Aware Security Architecture for Emerging Applications . In Proceedings of the Annual Computer Security Applications Conference (ACSAC). Covington, M., Fogla, P., Zhan, Z., and Ahamad, M. A Context-Aware Security Architecture for Emerging Applications. In Proceedings of the Annual Computer Security Applications Conference (ACSAC).","key":"e_1_3_2_1_2_1"},{"volume-title":"Developments in Agent Communication","author":"Kagal L.","unstructured":"Kagal , L. and Finin , T . Developments in Agent Communication . F. Dignum, R. van Eijk, and M. P. Huget (Eds.), Chapter Modeling Communicative Behavior using Permissions and Obligations . Kagal, L. and Finin, T. Developments in Agent Communication. F. Dignum, R. van Eijk, and M. P. Huget (Eds.), Chapter Modeling Communicative Behavior using Permissions and Obligations.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.5555\/1032650.1033542"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/32.824414"},{"volume-title":"Role Definition Language (RDL): A language to Describe Context- Aware Roles. Technical report","author":"Masone C.","unstructured":"Masone , C. Role Definition Language (RDL): A language to Describe Context- Aware Roles. Technical report , Dartmouth College , Computer Science . Hanover, NH. Masone, C. Role Definition Language (RDL): A language to Describe Context- Aware Roles. Technical report, Dartmouth College, Computer Science. Hanover, NH.","key":"e_1_3_2_1_7_1"},{"volume-title":"Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing.","author":"Osbakk P.","unstructured":"Osbakk , P. and Ryan , N . Context Privacy, CC\/PP, and P3P . In Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing. Osbakk, P. and Ryan, N. Context Privacy, CC\/PP, and P3P. In Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing.","key":"e_1_3_2_1_8_1"},{"volume-title":"Feature Interactions in Telecommunications and Software Systems","author":"Reiff-Marganiec S.","unstructured":"Reiff-Marganiec , S. and Turner , K. J . Feature Interactions in Telecommunications and Software Systems . D. Amyot and L. Logrippo (Eds.), IOS Press (Amsterdam) , Chapter A Policy Architecture for Enhancing and Controlling Features. Reiff-Marganiec, S. and Turner, K. J. Feature Interactions in Telecommunications and Software Systems . D. Amyot and L. Logrippo (Eds.), IOS Press (Amsterdam), Chapter A Policy Architecture for Enhancing and Controlling Features.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1028480.1028483"},{"volume-title":"Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing.","author":"Shankar N.","unstructured":"Shankar , N. and Balfanz , D . Enabling Secure Ad-Hoc Communication Using Context-Aware Security Services. Extended Abstract . In Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing. Shankar, N. and Balfanz, D. Enabling Secure Ad-Hoc Communication Using Context-Aware Security Services. Extended Abstract. In Proceedings of UBICOMP2002 - Workshop on Security in Ubiquitous Computing.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Knowledge Representation: Logical, Philosophical, and Computational Foundations","author":"Sowa J.F.","year":"2000","unstructured":"Sowa , J.F. Knowledge Representation: Logical, Philosophical, and Computational Foundations . Brooks Cole Publishing Co. , Pacific Grove, CA ( 2000 ). Sowa, J.F. Knowledge Representation: Logical, Philosophical, and Computational Foundations. Brooks Cole Publishing Co., Pacific Grove, CA (2000)."},{"key":"e_1_3_2_1_13_1","volume-title":"Guidelines on Firewalls and Firewall Policy. Computer Security Division. Information Technology Laboratory","author":"Wack J.","year":"2004","unstructured":"Wack , J. Guidelines on Firewalls and Firewall Policy. Computer Security Division. Information Technology Laboratory . National Institute of Standards and Technology . 2004 Wack,J. Guidelines on Firewalls and Firewall Policy. Computer Security Division. Information Technology Laboratory. National Institute of Standards and Technology. 2004"}],"event":{"sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"acronym":"WMASH06","name":"WMASH06: The 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots ( co-located with Mobicom 2006 Conference )","location":"Los Angeles CA USA"},"container-title":["Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161023.1161031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T04:42:26Z","timestamp":1673325746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161023.1161031"}},"subtitle":["a comprehensive helper"],"short-title":[],"issued":{"date-parts":[[2006,9,29]]},"references-count":12,"alternative-id":["10.1145\/1161023.1161031","10.1145\/1161023"],"URL":"https:\/\/doi.org\/10.1145\/1161023.1161031","relation":{},"subject":[],"published":{"date-parts":[[2006,9,29]]},"assertion":[{"value":"2006-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}