{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:23Z","timestamp":1750307243701,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2095697.2095759","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"293-296","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Policy-based security management in mobile environments"],"prefix":"10.1145","author":[{"given":"Mhammed","family":"Chraibi","sequence":"first","affiliation":[{"name":"Al Akhawayn University in Ifrane, Ifrane, Morocco"}]},{"given":"Hamid","family":"Harroud","sequence":"additional","affiliation":[{"name":"Al Akhawayn University in Ifrane, Ifrane, Morocco"}]},{"given":"Ahmed","family":"Karmouch","sequence":"additional","affiliation":[{"name":"University of Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"volume-title":"Personalized security in mobile environments using policies","author":"Chraibi M.","key":"e_1_3_2_1_1_1","unstructured":"Chraibi , M. , Harrourd , H. , and Maach , A . Personalized security in mobile environments using policies . In Press . Chraibi, M., Harrourd, H., and Maach, A. Personalized security in mobile environments using policies. In Press."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.71"},{"volume-title":"International Conference on Network and Electronics Engineering IPCSIT.","author":"Shahba H.","key":"e_1_3_2_1_3_1","unstructured":"Shahba , H. , and Sabaei , M ., Security threats for widespread services in mobile environment. 2011 . International Conference on Network and Electronics Engineering IPCSIT. Shahba, H., and Sabaei, M., Security threats for widespread services in mobile environment. 2011. International Conference on Network and Electronics Engineering IPCSIT."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Electronic Design","author":"Sudin S.","year":"2008","unstructured":"Sudin , S. , Tretiakov , A. , Ali , R. H. R. M. , and Rusli , M. E . Attacks on mobile networks: An overview of new security challenge. 2008 . In International Conference on Electronic Design , 2008 . 1--6. Sudin, S., Tretiakov, A., Ali, R. H. R. M., and Rusli, M. E. Attacks on mobile networks: An overview of new security challenge. 2008. In International Conference on Electronic Design, 2008. 1--6."},{"volume-title":"CHINACOM'07","author":"Szymacha R.","key":"e_1_3_2_1_5_1","unstructured":"Szymacha , R. , Szydlo , T. , Zielinski , K. , Jean , K. , and Galis , A . ContextWare Architecture for Ambient Networks. 2007 . CHINACOM'07 . 734--738. Szymacha, R., Szydlo, T., Zielinski, K., Jean, K., and Galis, A. ContextWare Architecture for Ambient Networks. 2007. CHINACOM'07. 734--738."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2006.21"},{"volume-title":"Proceedings of POLICY. 18--38","author":"Damianou N.","key":"e_1_3_2_1_7_1","unstructured":"Damianou , N. , Dulay , N. , Lupu , E. , and Sloman , M . The Ponder policy specification language.2001 . In Proceedings of POLICY. 18--38 . Damianou, N., Dulay, N., Lupu, E., and Sloman, M. The Ponder policy specification language.2001. In Proceedings of POLICY. 18--38."},{"key":"e_1_3_2_1_8_1","volume-title":"Context-Aware Platform to Support Mobile Users with Personalized Services","author":"Bouzid Y.","year":"2009","unstructured":"Bouzid , Y. , Harroud , H ,. Berrado , A. , and Boulmalf , M . Context-Aware Platform to Support Mobile Users with Personalized Services . 2009 . In Proceeding of WINSYS. 153--158. Bouzid, Y., Harroud, H,. Berrado, A., and Boulmalf, M. Context-Aware Platform to Support Mobile Users with Personalized Services. 2009. In Proceeding of WINSYS. 153--158."}],"event":{"name":"MoMM '11: The 9th International Conference on Advances in Mobile Computing & Multimedia","acronym":"MoMM '11","location":"Ho Chi Minh City Vietnam"},"container-title":["Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2095697.2095759","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2095697.2095759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:00Z","timestamp":1750243920000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2095697.2095759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":8,"alternative-id":["10.1145\/2095697.2095759","10.1145\/2095697"],"URL":"https:\/\/doi.org\/10.1145\/2095697.2095759","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}