{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T08:42:13Z","timestamp":1773304933295,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T00:00:00Z","timestamp":1465171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-1111512."],"award-info":[{"award-number":["CNS-1111512."]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,6]]},"DOI":"10.1145\/2914642.2914648","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T13:09:57Z","timestamp":1465564197000},"page":"63-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Context-Aware System to Secure Enterprise Content"],"prefix":"10.1145","author":[{"given":"Oyindamola","family":"Oluwatimi","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Daniele","family":"Midi","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486039"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"1567","DOI":"10.1007\/978-3-540-76843-2_32","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"Aich S.","year":"2007"},{"key":"e_1_3_2_1_3_1","unstructured":"A. Anderson. Xacml profile for role based access control (rbac). OASIS Access Control TC committee draft 1:13 2004.  A. Anderson. Xacml profile for role based access control (rbac). OASIS Access Control TC committee draft 1:13 2004."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240116.2240123"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517370"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2007.014070"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627418"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_52"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"e_1_3_2_1_10_1","first-page":"108","volume-title":"Evaluating AAL Systems Through Competitive Benchmarking","author":"Bocca M.","year":"2012"},{"key":"e_1_3_2_1_11_1","first-page":"711","volume-title":"PWC 2003, Venice, Italy, September 23-25, 2003. Proceedings, chapter Design and Analysis of a Bluetooth-Based Indoor Localization System","author":"Bruno R.","year":"2003"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11581062_27"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352542"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335294"},{"key":"e_1_3_2_1_15_1","volume-title":"Artech House","author":"Ferraiolo D.","year":"2003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197536"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.08.012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.113"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"D. Hardt. The oauth 2.0 authorization framework. 2012.  D. Hardt. The oauth 2.0 authorization framework. 2012.","DOI":"10.17487\/rfc6749"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370282"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809860"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093973.2094018"},{"key":"e_1_3_2_1_23_1","first-page":"100","volume-title":"Telecommunications and Computer Networks (SoftCOM), 2014 22nd International Conference on","author":"Larchikov A.","year":"2014"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.160"},{"key":"e_1_3_2_1_25_1","first-page":"200502","article-title":"Extensible access control markup language (xacml) version 2.0","author":"Moses T.","year":"2005","journal-title":"Oasis Standard"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"O. Oluwatimi D. Midi and E. Bertino. Overview of mobile containerization approaches and open research directions. Under submission 2016.  O. Oluwatimi D. Midi and E. Bertino. Overview of mobile containerization approaches and open research directions. Under submission 2016.","DOI":"10.1109\/MSP.2017.12"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"issue":"4","key":"e_1_3_2_1_30_1","first-page":"33","article-title":"Design and performance evaluation of novel location-based access control algorithm using ieee 802.11 r","volume":"10","author":"Saelim T.","year":"2015","journal-title":"Journal of Convergence Information Technology"},{"issue":"2","key":"e_1_3_2_1_31_1","first-page":"150","article-title":"Context-based access control systems for mobile devices. Dependable and Secure Computing","volume":"12","author":"Shebaro B.","year":"2015","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMW.2003.1266069"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639112"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Q. Xu R. Zheng W. Saad and Z. Han. Device fingerprinting in wireless networks: Challenges and opportunities. 2015.  Q. Xu R. Zheng W. Saad and Z. Han. Device fingerprinting in wireless networks: Challenges and opportunities. 2015.","DOI":"10.1109\/COMST.2015.2476338"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"F. Zafari I. Papapanagiotou and K. Christidis. Micro-location for internet of things equipped smart buildings. 2015.  F. Zafari I. Papapanagiotou and K. Christidis. Micro-location for internet of things equipped smart buildings. 2015.","DOI":"10.1109\/JIOT.2015.2442956"}],"event":{"name":"SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies","location":"Shanghai China","acronym":"SACMAT 2016","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2914642.2914648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2914642.2914648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:26Z","timestamp":1750222586000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2914642.2914648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,6]]},"references-count":38,"alternative-id":["10.1145\/2914642.2914648","10.1145\/2914642"],"URL":"https:\/\/doi.org\/10.1145\/2914642.2914648","relation":{},"subject":[],"published":{"date-parts":[[2016,6,6]]},"assertion":[{"value":"2016-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}