{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:11Z","timestamp":1750306271277,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3036382","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Context-awareness security model based on multi-agents system operating in complex environment"],"prefix":"10.1145","author":[{"given":"Haoua","family":"Cheribi","sequence":"first","affiliation":[{"name":"Constantine2 University, Constantine, Algeria"}]},{"given":"Noureddine","family":"Amraoui","sequence":"additional","affiliation":[{"name":"Constantine2 University, Constantine, Algeria"}]},{"given":"Abdelkrim","family":"Bouramoul","sequence":"additional","affiliation":[{"name":"Constantine2 University, Constantine, Algeria"}]},{"given":"Mohamed Khireddine","family":"Kholladi","sequence":"additional","affiliation":[{"name":"El Oued University, El Oued, Algeria"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.004"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.05.036"},{"key":"e_1_3_2_1_3_1","volume-title":"Context-aware Non-electronic Service Discovery and Composition. Thesis Diss","author":"Zhang Y.","year":"2015","unstructured":"Zhang , Y. Context-aware Non-electronic Service Discovery and Composition. Thesis Diss . Concordia University , 2015 . Zhang, Y. Context-aware Non-electronic Service Discovery and Composition. Thesis Diss. Concordia University, 2015."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Bao Fenye etal \" IEEE transactions on network and service management 9.2 (2012): 169--183..  Bao Fenye et al. \" IEEE transactions on network and service management 9.2 (2012): 169--183..","DOI":"10.1109\/TCOMM.2012.031912.110179"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2009.74"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.418"},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE","author":"Shabut M.","year":"2015","unstructured":"Shabut , Antesar M. , Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks.\" 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) . IEEE , 2015 . Shabut, Antesar M., et al. \"Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks.\" 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015."},{"key":"e_1_3_2_1_9_1","unstructured":"Page J. Zaslavsky A. et Indrawan M. \"A buddy model of security for mobile agent communities operating in pervasive scenarios\" In : Proceedings of the second workshop on Australasian information security Data Mining and Web Intelligence and Software Internationalisation-Volume 32. Australian Computer Society Inc. 2004. p. 17--25.   Page J. Zaslavsky A. et Indrawan M. \"A buddy model of security for mobile agent communities operating in pervasive scenarios\" In : Proceedings of the second workshop on Australasian information security Data Mining and Web Intelligence and Software Internationalisation-Volume 32. Australian Computer Society Inc. 2004. p. 17--25."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1009.I9P0339"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Buchegger S. and Le Boudec J.-Y. \"A Robust Reputation System for P2P and Mobile Ad hoc Networks \" P2P and Mobile Ad-hoc Networks 2004.  Buchegger S. and Le Boudec J.-Y. \"A Robust Reputation System for P2P and Mobile Ad hoc Networks \" P2P and Mobile Ad-hoc Networks 2004.","DOI":"10.1201\/9780203504086.ch20"},{"key":"e_1_3_2_1_12_1","first-page":"37","volume-title":"2011 International Workshop on","author":"Chen H.","year":"2011","unstructured":"Chen , H. , Zhang X. , Zhang D. , and Fu Z ., \" Multi-agent collaboration based trust routing scheme for military ad hoc network,\" in Open-Source Software for Scientific Computation (OSSC) , 2011 International Workshop on , pp. 37 -- 42 , 2011 . Chen, H., Zhang X., Zhang D., and Fu Z., \"Multi-agent collaboration based trust routing scheme for military ad hoc network,\" in Open-Source Software for Scientific Computation (OSSC), 2011 International Workshop on, pp. 37--42, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Department of Computer and Information Sciences Indiana University South Bend","author":"Call A.","year":"2013","unstructured":"Call A. , \" Review of Database Intrusion Detection Methodologies using Attribute Dependence,\" Technical Report , Department of Computer and Information Sciences Indiana University South Bend , 2013 . Call A., \"Review of Database Intrusion Detection Methodologies using Attribute Dependence,\" Technical Report, Department of Computer and Information Sciences Indiana University South Bend, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.33"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-007-0051-4"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Intrusions in RBAC Enabled Databases,\" in The International Conference on Computing Communication and Networking Technologies (ICCCNT)","author":"Rao U. P.","year":"2010","unstructured":"Rao U. P. , Sahani G. J. , and Patel , \"Machine Learning Proposed Approach for Detecting Database D. R. Intrusions in RBAC Enabled Databases,\" in The International Conference on Computing Communication and Networking Technologies (ICCCNT) , pp. 1 -- 4 , 2010 . Rao U. P., Sahani G. J., and Patel, \"Machine Learning Proposed Approach for Detecting Database D. R. Intrusions in RBAC Enabled Databases,\" in The International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1--4, 2010."},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE","author":"Doroudian","year":"2015","unstructured":"Doroudian , Mostafa, Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction.\" 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) . IEEE , 2015 . Doroudian, Mostafa, et al. \"Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction.\" 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015."},{"key":"e_1_3_2_1_18_1","first-page":"75","volume-title":"2005 IEEE 2nd Symposium on. IEEE","author":"Montanari R.","year":"2005","unstructured":"Montanari R. , Toninelli , A. , et bradshaw, M.J. \" Context -based security management for multi-agent systems\". In : Multi-Agent Security and Survivability , 2005 IEEE 2nd Symposium on. IEEE , 2005 . p. 75 -- 84 . Montanari R., Toninelli, A., et bradshaw, M.J. \"Context-based security management for multi-agent systems\". In : Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on. IEEE, 2005. p. 75--84."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.174"},{"volume-title":"2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (pp. 196--196)","author":"Eyers","key":"e_1_3_2_1_20_1","unstructured":"D. M. Eyers , , W. Wang , , & K. Moody, Policy storage for role-based access control systems . In 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (pp. 196--196) . IEEE Computer Society. D. M.Eyers, , W.Wang, , & K.Moody, Policy storage for role-based access control systems. In 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (pp. 196--196). IEEE Computer Society."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784769"},{"key":"e_1_3_2_1_22_1","volume-title":"Interaction Diagrams. Working Documents. AUML Official Website","author":"Huget M.P.","year":"2003","unstructured":"Huget , M.P. , : Interaction Diagrams. Working Documents. AUML Official Website ( 2003 ), http:\/\/www.auml.org\/ Huget, M.P., et al.: Interaction Diagrams. Working Documents. AUML Official Website (2003), http:\/\/www.auml.org\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04947-7_14"},{"key":"e_1_3_2_1_24_1","volume-title":"Universit\u00e9 de Queensland","author":"Henrickse K.","year":"2003","unstructured":"Henrickse K. , \"A framework for context-aware pervasive computing applications\", th\u00e8se de Doctorat, \u00e9cole de la technologie de l'information et g\u00e9nie \u00e9lectrique , Universit\u00e9 de Queensland , 2003 . Henrickse K., \"A framework for context-aware pervasive computing applications\", th\u00e8se de Doctorat, \u00e9cole de la technologie de l'information et g\u00e9nie \u00e9lectrique, Universit\u00e9 de Queensland, 2003."},{"issue":"1","key":"e_1_3_2_1_25_1","first-page":"61","article-title":"An ontology-driven approach applied to information security","volume":"42","author":"Vorobiev","year":"2010","unstructured":"Vorobiev , Artem, and Nargiza B . \" An ontology-driven approach applied to information security .\" Journal of Research and Practice in Information Technology 42 . 1 ( 2010 ): 61 .. Vorobiev, Artem, and Nargiza B. \"An ontology-driven approach applied to information security.\" Journal of Research and Practice in Information Technology 42.1 (2010): 61..","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.72"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1663-7_16"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.05.003"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3036382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3036382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:41Z","timestamp":1750221521000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3036382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":28,"alternative-id":["10.1145\/3018896.3036382","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3036382","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}