{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:35Z","timestamp":1750306895817,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T00:00:00Z","timestamp":1354492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,3]]},"DOI":"10.1145\/2428736.2428755","type":"proceedings-article","created":{"date-parts":[[2013,1,15]],"date-time":"2013-01-15T15:41:50Z","timestamp":1358264510000},"page":"101-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Context-awareness"],"prefix":"10.1145","author":[{"given":"M. Fahim Ferdous","family":"Khan","sequence":"first","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ken","family":"Sakamura","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2012,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Annual Computer Security Applications Conference","author":"Sampemane G.","year":"2002","unstructured":"Sampemane G. , Naldurg P. and Campbell , R. H . 2002. Access control for active spaces . In Proceedings of Annual Computer Security Applications Conference ( 2002 ), 343--352. Sampemane G., Naldurg P. and Campbell, R. H. 2002. Access control for active spaces. In Proceedings of Annual Computer Security Applications Conference (2002), 343--352."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373258"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507730"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11847366_59"},{"key":"e_1_3_2_1_8_1","unstructured":"Xianxi H. Haiyang W. Zhenxiang C. and Jinjiou L. 2006. A context rule and RBAC access control in enterprise pervasive computing environment \" In Proceedings of 1st International Symposium on Pervasive Computing and Applications (2006) 497--502.  Xianxi H. Haiyang W. Zhenxiang C. and Jinjiou L. 2006. A context rule and RBAC access control in enterprise pervasive computing environment \" In Proceedings of 1st International Symposium on Pervasive Computing and Applications (2006) 497--502."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266748"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373259"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Schmidt A. Beigl M. and Gellersen H. 1999. There is more to context than location. Computers & Graphics 23 6 (Dec. 1999) 893--901  Schmidt A. Beigl M. and Gellersen H. 1999. There is more to context than location. Computers & Graphics 23 6 (Dec. 1999) 893--901","DOI":"10.1016\/S0097-8493(99)00120-X"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of Symposium on Usable Privacy and Security (SOUPS","author":"Wang Q.","year":"2008","unstructured":"Wang , Q. and Jin , H . 2008 Usable authentication for electronic healthcare systems . In Proceedings of Symposium on Usable Privacy and Security (SOUPS 2008 ). Wang, Q. and Jin, H. 2008 Usable authentication for electronic healthcare systems. In Proceedings of Symposium on Usable Privacy and Security (SOUPS 2008)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_14_1","volume-title":"ZBAC: The evolution of access control models. Technical Report HPL-2009-30, HP Labs.","author":"Karp A. H.","year":"2009","unstructured":"Karp , A. H. , Haury , H. and Davis , M. S . 2009 . From ABAC to ZBAC: The evolution of access control models. Technical Report HPL-2009-30, HP Labs. Karp, A. H., Haury, H. and Davis, M. S. 2009. From ABAC to ZBAC: The evolution of access control models. Technical Report HPL-2009-30, HP Labs."},{"key":"e_1_3_2_1_15_1","unstructured":"HIPAA Health Insurance Portability and Accountability Act http:\/\/www.hhs.gov\/ocr\/privacy\/index.html  HIPAA Health Insurance Portability and Accountability Act http:\/\/www.hhs.gov\/ocr\/privacy\/index.html"},{"key":"e_1_3_2_1_16_1","unstructured":"HL7 Health Level Seven International http:\/\/www.hl7.org\/  HL7 Health Level Seven International http:\/\/www.hl7.org\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.977753"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of 4th IFIP International Conference on New Technologies, Mobility and Security","author":"Yashiro T.","year":"2011","unstructured":"Yashiro , T. , Khan , M. F. F. , Ito , S. , Bessho , M. Kobayashi , S. , Usaka , T. Koshizuka N. and Sakamura , K . 2011. eTNet: A smart card network architecture for flexible electronic commerce services . In Proceedings of 4th IFIP International Conference on New Technologies, Mobility and Security ( 2011 ), 1--5. Yashiro, T., Khan, M. F. F., Ito, S., Bessho, M. Kobayashi, S., Usaka, T. Koshizuka N. and Sakamura, K. 2011. eTNet: A smart card network architecture for flexible electronic commerce services. In Proceedings of 4th IFIP International Conference on New Technologies, Mobility and Security (2011), 1--5."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.40"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.63"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.87"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"e_1_3_2_1_23_1","unstructured":"Canada Health Infoway https:\/\/www.infoway-inforoute.ca\/lang-en\/  Canada Health Infoway https:\/\/www.infoway-inforoute.ca\/lang-en\/"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of National Information Systems Security Conference","author":"Barka E.","year":"2000","unstructured":"Barka , E. and Sandhu , R . 2000. A role-based delegation model and some extensions . In Proceedings of National Information Systems Security Conference ( 2000 ), 101--114. Barka, E. and Sandhu, R. 2000. A role-based delegation model and some extensions. In Proceedings of National Information Systems Security Conference (2000), 101--114."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.31"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373289"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775431"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.12"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998453"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.19"},{"key":"e_1_3_2_1_31_1","unstructured":"The Prot\u00e9g\u00e9 Ontology Editor and Knowledge Acquisition System http:\/\/protege.stanford.edu\/  The Prot\u00e9g\u00e9 Ontology Editor and Knowledge Acquisition System http:\/\/protege.stanford.edu\/"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings. 24th Conference of the Center for Advanced Studies on Collaborative Research","author":"Rjaibi W.","year":"2004","unstructured":"Rjaibi W. 2004 . An introduction to multilevel secure relational database management systems . In Proceedings. 24th Conference of the Center for Advanced Studies on Collaborative Research (2004), 232--241. Rjaibi W. 2004. An introduction to multilevel secure relational database management systems. In Proceedings. 24th Conference of the Center for Advanced Studies on Collaborative Research (2004), 232--241."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"}],"event":{"name":"IIWAS '12: The 14th International Conference on Information Integration and Web-based Applications & Services","sponsor":["@WAS International Organization of Information Integration and Web-based Applications and Services","ACM Association for Computing Machinery"],"location":"Bali Indonesia","acronym":"IIWAS '12"},"container-title":["Proceedings of the 14th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2428736.2428755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2428736.2428755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:02Z","timestamp":1750234742000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2428736.2428755"}},"subtitle":["exploring the imperative shared context of security and ubiquitous computing"],"short-title":[],"issued":{"date-parts":[[2012,12,3]]},"references-count":33,"alternative-id":["10.1145\/2428736.2428755","10.1145\/2428736"],"URL":"https:\/\/doi.org\/10.1145\/2428736.2428755","relation":{},"subject":[],"published":{"date-parts":[[2012,12,3]]},"assertion":[{"value":"2012-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}