{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:04Z","timestamp":1750307464261,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,20]],"date-time":"2010-10-20T00:00:00Z","timestamp":1287532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,20]]},"DOI":"10.1145\/1868630.1868634","type":"proceedings-article","created":{"date-parts":[[2010,10,26]],"date-time":"2010-10-26T12:36:11Z","timestamp":1288096571000},"page":"19-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Putting together QoS and security in autonomic pervasive systems"],"prefix":"10.1145","author":[{"given":"Mourad","family":"Alia","sequence":"first","affiliation":[{"name":"University of Oslo, Oslo, Norway"}]},{"given":"Marc","family":"Lacoste","sequence":"additional","affiliation":[{"name":"Orange Labs, Issy Les Moulineaux, France"}]},{"given":"Ruan","family":"He","sequence":"additional","affiliation":[{"name":"Orange Labs, Issy Les Moulineaux, France"}]},{"given":"Frank","family":"Eliassen","sequence":"additional","affiliation":[{"name":"University of Oslo, Oslo, Norway"}]}],"member":"320","published-online":{"date-parts":[[2010,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.64"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11914952_45"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.283"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUROMICRO.2005.48"},{"key":"e_1_3_2_1_5_1","volume-title":"DARPA Information Survivability Conference and Exposition (DISCEX)","author":"Bowers S.","year":"2000","unstructured":"S. Bowers , L. Delcambre , D. Maier , C. Cowan , P. Wagle , D. McNamee , A.-F. Le Meur , and H. Hinton . Applying Adaptation Spaces to Support Quality of Service and Survivability . In DARPA Information Survivability Conference and Exposition (DISCEX) , 2000 . S. Bowers, L. Delcambre, D. Maier, C. Cowan, P. Wagle, D. McNamee, A.-F. Le Meur, and H. Hinton. Applying Adaptation Spaces to Support Quality of Service and Survivability. In DARPA Information Survivability Conference and Exposition (DISCEX), 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v36:11\/12"},{"key":"e_1_3_2_1_7_1","volume-title":"A General Risk Assessment of Security in Pervasive Computing","author":"Chen Y.","year":"2003","unstructured":"Y. Chen , C. D. Jensen , E. Gray , V. Cahill , and J.-M. Seigneur . A General Risk Assessment of Security in Pervasive Computing , 2003 . Y. Chen, C. D. Jensen, E. Gray, V. Cahill, and J.-M. Seigneur. A General Risk Assessment of Security in Pervasive Computing, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0107"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582133"},{"key":"e_1_3_2_1_10_1","volume-title":"Towards Measuring Anonymity. In Privacy Enhancing Technologies Workshop (PET)","author":"Diaz C.","year":"2002","unstructured":"C. Diaz , S. Seys , J. Claessens , and B. Preneel . Towards Measuring Anonymity. In Privacy Enhancing Technologies Workshop (PET) , 2002 . C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards Measuring Anonymity. In Privacy Enhancing Technologies Workshop (PET), 2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_12_1","volume-title":"Exploiting Content-Based Networking for Fine Granularity Multi-Receiver Video Streaming. In Annual Conference on Multimedia Computing and Networking (MMCN)","author":"Eide V.","year":"2005","unstructured":"V. Eide , F. Eliassen , and J. Michaelsen . Exploiting Content-Based Networking for Fine Granularity Multi-Receiver Video Streaming. In Annual Conference on Multimedia Computing and Networking (MMCN) , 2005 . V. Eide, F. Eliassen, and J. Michaelsen. Exploiting Content-Based Networking for Fine Granularity Multi-Receiver Video Streaming. In Annual Conference on Multimedia Computing and Networking (MMCN), 2005."},{"key":"e_1_3_2_1_13_1","volume-title":"30th Information Systems Research Seminar in Scandinavia (IRIS30)","author":"Eriks\u00e9n S.","year":"2007","unstructured":"S. Eriks\u00e9n , C. Eliasson , M. Fiedler , S. Chevul , and A. Ekelin . Mapping Service Quality - Measuring and Comparing Quality of Experience and Quality of Service for Internet-Based Map Services . In 30th Information Systems Research Seminar in Scandinavia (IRIS30) , Tampere , Finland , 2007 . S. Eriks\u00e9n, C. Eliasson, M. Fiedler, S. Chevul, and A. Ekelin. Mapping Service Quality - Measuring and Comparing Quality of Experience and Quality of Service for Internet-Based Map Services. In 30th Information Systems Research Seminar in Scandinavia (IRIS30), Tampere, Finland, 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.61"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0005"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"e_1_3_2_1_17_1","volume-title":"Virginia Polytechnic Institute and State University","author":"Hager C.","year":"2004","unstructured":"C. Hager . Context Aware and Adaptive Security for Wireless Networks. PhD thesis , Virginia Polytechnic Institute and State University , 2004 . C. Hager. Context Aware and Adaptive Security for Wireless Networks. PhD thesis, Virginia Polytechnic Institute and State University, 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2010.22"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1279711.1279718"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2005.21"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575801_34"},{"issue":"1","key":"e_1_3_2_1_22_1","first-page":"121","volume":"64","author":"Lacoste M.","year":"2008","unstructured":"M. Lacoste , T. Jarboui , and R. He . A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control. Annals of Telecommunications , 64 ( 1-2 ): 121 -- 146 , 2008 . M. Lacoste, T. Jarboui, and R. He. A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control. Annals of Telecommunications, 64(1-2):121--146, 2008.","journal-title":"A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control. Annals of Telecommunications"},{"key":"e_1_3_2_1_23_1","volume-title":"Evaluating Confidence in Context for Context-Aware Security. In European Conference on Ambient Intelligence (AmI)","author":"Lacoste M.","year":"2007","unstructured":"M. Lacoste , G. Privat , and F. Ramparany . Evaluating Confidence in Context for Context-Aware Security. In European Conference on Ambient Intelligence (AmI) , 2007 . M. Lacoste, G. Privat, and F. Ramparany. Evaluating Confidence in Context for Context-Aware Security. In European Conference on Ambient Intelligence (AmI), 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.10.001"},{"key":"e_1_3_2_1_26_1","volume-title":"Noninterference and the Composability of Security Properties. In IEEE Symposium on Security and Privacy","author":"McCullough D.","year":"1988","unstructured":"D. McCullough . Noninterference and the Composability of Security Properties. In IEEE Symposium on Security and Privacy , 1988 . D. McCullough. Noninterference and the Composability of Security Properties. In IEEE Symposium on Security and Privacy, 1988."},{"key":"e_1_3_2_1_27_1","volume-title":"International Workshop on Secure Ubiquitous Networks (SUN)","author":"Mendoza F.","year":"2005","unstructured":"F. Mendoza Design of an Enhanced PKI for Ubiquitous Networks . In International Workshop on Secure Ubiquitous Networks (SUN) , 2005 . F. Mendoza et al. Design of an Enhanced PKI for Ubiquitous Networks. In International Workshop on Secure Ubiquitous Networks (SUN), 2005."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDT.2006.31"},{"volume-title":"Workshop on Logical Foundations of an Adaptive Security Infrastructure (WOLFASI), 2004. In conjunction with Workshop on Foundations on Computer Security (FCS).","author":"Sabelfeld A.","key":"e_1_3_2_1_29_1","unstructured":"A. Sabelfeld , editor. Workshop on Logical Foundations of an Adaptive Security Infrastructure (WOLFASI), 2004. In conjunction with Workshop on Foundations on Computer Security (FCS). A. Sabelfeld, editor. Workshop on Logical Foundations of an Adaptive Security Infrastructure (WOLFASI), 2004. In conjunction with Workshop on Foundations on Computer Security (FCS)."},{"key":"e_1_3_2_1_30_1","volume-title":"Privacy Enhancing Technologies Workshop (PET)","author":"Serjantov A.","year":"2002","unstructured":"A. Serjantov and G. Danezis . Towards an Information Theoretic Metric for Anonymity . In Privacy Enhancing Technologies Workshop (PET) , 2002 . A. Serjantov and G. Danezis. Towards an Information Theoretic Metric for Anonymity. In Privacy Enhancing Technologies Workshop (PET), 2002."},{"key":"e_1_3_2_1_31_1","volume-title":"Information Hiding Workshop (IH)","author":"Serjantov A.","year":"2002","unstructured":"A. Serjantov , R. Dingledine , and P. Syverson . From a Trickle to a Flood: Active Attacks on Several Mix Types . In Information Hiding Workshop (IH) , 2002 . A. Serjantov, R. Dingledine, and P. Syverson. From a Trickle to a Flood: Active Attacks on Several Mix Types. In Information Hiding Workshop (IH), 2002."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/784591.784722"},{"key":"e_1_3_2_1_33_1","unstructured":"VoIP Security Alliance (VoIPSA). VoIP Security and Privacy Threat Taxonomy. http:\/\/www.voipsa.org\/ 2005.  VoIP Security Alliance (VoIPSA). VoIP Security and Privacy Threat Taxonomy. http:\/\/www.voipsa.org\/ 2005."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.141"}],"event":{"name":"MSWiM '10: The 13th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Bodrum Turkey","acronym":"MSWiM '10"},"container-title":["Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868630.1868634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1868630.1868634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:29Z","timestamp":1750248509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868630.1868634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,20]]},"references-count":34,"alternative-id":["10.1145\/1868630.1868634","10.1145\/1868630"],"URL":"https:\/\/doi.org\/10.1145\/1868630.1868634","relation":{},"subject":[],"published":{"date-parts":[[2010,10,20]]},"assertion":[{"value":"2010-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}