{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:13Z","timestamp":1750220713254,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T00:00:00Z","timestamp":1576195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,13]]},"DOI":"10.1145\/3375998.3376026","type":"proceedings-article","created":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T10:30:03Z","timestamp":1580207403000},"page":"28-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Decentralized Context-aware Cross-domain Authorization Scheme for Pervasive Computing"],"prefix":"10.1145","author":[{"given":"Bin","family":"Song","sequence":"first","affiliation":[{"name":"Henan University of Science and Technology and Henan International Joint Laboratory of Cyberspace, Security Applications, Luoyang, China"}]},{"given":"Min","family":"Gao","sequence":"additional","affiliation":[{"name":"Luoyang Institute of Science and Technology, Luoyang, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,28]]},"reference":[{"volume-title":"Context-Aware Computing. Ubiquitous computing fundamentals","author":"Dey K.","key":"e_1_3_2_1_1_1","unstructured":"Dey , Anind K. 2018. Context-Aware Computing. Ubiquitous computing fundamentals . Chapman and Hall\/CRC , 335--366. Dey, Anind K. 2018. Context-Aware Computing. Ubiquitous computing fundamentals. Chapman and Hall\/CRC, 335--366."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.01.002"},{"volume-title":"Context-Aware and Self-learning Dynamic Transport Scheduling in Hospitals. European Semantic Web Conference, Springer, Cham. DOI= http:\/\/dx.doi.org\/10","author":"Bonte P.","key":"e_1_3_2_1_3_1","unstructured":"Bonte , P. , Ongenae , F. , Schaballie , J. , Vancroonenburg , W. , Vankeirsbilck , B. , and Turck , F. D . 2017 . Context-Aware and Self-learning Dynamic Transport Scheduling in Hospitals. European Semantic Web Conference, Springer, Cham. DOI= http:\/\/dx.doi.org\/10 .1007\/978-3-319-70407-4_31. 10.1007\/978-3-319-70407-4_31 Bonte, P., Ongenae, F., Schaballie, J., Vancroonenburg, W., Vankeirsbilck, B., and Turck, F. D. 2017. Context-Aware and Self-learning Dynamic Transport Scheduling in Hospitals. European Semantic Web Conference, Springer, Cham. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-319-70407-4_31."},{"key":"e_1_3_2_1_4_1","article-title":"An ontology-driven context-aware recommender system for indoor shopping based on cellular automata","author":"Orciuoli F.","year":"2016","unstructured":"Orciuoli , F. , and Parente , M. 2016 . An ontology-driven context-aware recommender system for indoor shopping based on cellular automata . Journal of Ambient Intelligence and Humanized Computing, 937--955. DOI= http:\/\/dx.doi.org\/10.1007\/s12652-016-0411-2. 10.1007\/s12652-016-0411-2 Orciuoli, F., and Parente, M. 2016. An ontology-driven context-aware recommender system for indoor shopping based on cellular automata. Journal of Ambient Intelligence and Humanized Computing, 937--955. DOI= http:\/\/dx.doi.org\/10.1007\/s12652-016-0411-2.","journal-title":"Journal of Ambient Intelligence and Humanized Computing, 937--955. DOI= http:\/\/dx.doi.org\/10.1007\/s12652-016-0411-2."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2018100101"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1108\/JHTT-10-2014-0064"},{"volume-title":"The 27th Australasian Conference on Information Systems.","author":"Dou E.","key":"e_1_3_2_1_7_1","unstructured":"Dou , E. , Eklund , P. W. , and Gretzel , U . 2016. Location privacy acceptance: attitudes to transport-based location-aware mobile applications on University campus . The 27th Australasian Conference on Information Systems. Dou, E., Eklund, P. W., and Gretzel, U. 2016. Location privacy acceptance: attitudes to transport-based location-aware mobile applications on University campus. The 27th Australasian Conference on Information Systems."},{"key":"#cr-split#-e_1_3_2_1_8_1.1","unstructured":"Koay K. L. Syrdal D. Bormann R. Saunders J. Walters M. L. and Dautenhahn K. 2017. Initial design implementation and technical evaluation of a context-aware proxemics planner for a social robot. DOI= http:\/\/dx.doi.org\/ 10.1007\/978-3-319-70022-9_2. 10.1007\/978-3-319-70022-9_2"},{"key":"#cr-split#-e_1_3_2_1_8_1.2","doi-asserted-by":"crossref","unstructured":"Koay K. L. Syrdal D. Bormann R. Saunders J. Walters M. L. and Dautenhahn K. 2017. Initial design implementation and technical evaluation of a context-aware proxemics planner for a social robot. DOI= http:\/\/dx.doi.org\/ 10.1007\/978-3-319-70022-9_2.","DOI":"10.1007\/978-3-319-70022-9_2"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 40th International Conference on Software Engineering. ACM. DOI= http:\/\/dx.doi.org\/10","author":"Bradley N. C.","year":"1801","unstructured":"Bradley , N. C. , Fritz T. , and Holmes R . 2018. Context-aware conversational developer assistants . In Proceedings of the 40th International Conference on Software Engineering. ACM. DOI= http:\/\/dx.doi.org\/10 .1145\/3 1801 55.3180238. 10.1145\/3180155.3180238 Bradley, N. C., Fritz T., and Holmes R. 2018. Context-aware conversational developer assistants. In Proceedings of the 40th International Conference on Software Engineering. ACM. DOI= http:\/\/dx.doi.org\/10.1145\/3180155.3180238."},{"key":"#cr-split#-e_1_3_2_1_10_1.1","doi-asserted-by":"crossref","unstructured":"Huang L. S. Su J. Y. and Pao T. L. 2019. A Context Aware Smart Classroom Architecture for Smart Campuses. Applied Sciences. DOI= http:\/\/dx.doi.org\/10.3390\/app9091837. 10.3390\/app9091837","DOI":"10.3390\/app9091837"},{"key":"#cr-split#-e_1_3_2_1_10_1.2","doi-asserted-by":"crossref","unstructured":"Huang L. S. Su J. Y. and Pao T. L. 2019. A Context Aware Smart Classroom Architecture for Smart Campuses. Applied Sciences. DOI= http:\/\/dx.doi.org\/10.3390\/app9091837.","DOI":"10.3390\/app9091837"},{"volume-title":"Proceedings of the International Workshop on Semantic Big Data. ACM. DOI= http:\/\/dx.doi.org\/10","author":"Hosseinzadeh S.","key":"e_1_3_2_1_11_1","unstructured":"Hosseinzadeh , S. , Virtanen , S. , Natalia D\u00edaz-Rodr\u00edguez , and Lilius, J . 2016. A semantic security framework and context-aware role-based access control ontology for smart spaces . In Proceedings of the International Workshop on Semantic Big Data. ACM. DOI= http:\/\/dx.doi.org\/10 .1145\/2928294.2928300. 10.1145\/2928294.2928300 Hosseinzadeh, S., Virtanen, S., Natalia D\u00edaz-Rodr\u00edguez, and Lilius, J. 2016. A semantic security framework and context-aware role-based access control ontology for smart spaces. In Proceedings of the International Workshop on Semantic Big Data. ACM. DOI= http:\/\/dx.doi.org\/10.1145\/2928294.2928300."},{"key":"e_1_3_2_1_12_1","unstructured":"Singh K. K. 2016. Context-aware permission control of hybrid mobile applications.  Singh K. K. 2016. Context-aware permission control of hybrid mobile applications."},{"volume-title":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM. DOI= http:\/\/dx.doi.org\/10","author":"Iyer P.","key":"e_1_3_2_1_13_1","unstructured":"Iyer , P. , and Masoumzadeh A . 2019. Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems . In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM. DOI= http:\/\/dx.doi.org\/10 .1145\/3322431.3325419. 10.1145\/3322431.3325419 Iyer, P., and Masoumzadeh A. 2019. Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM. DOI= http:\/\/dx.doi.org\/10.1145\/3322431.3325419."},{"key":"e_1_3_2_1_14_1","volume-title":"Context-Aware Adaptive Authentication and Authorization in Internet of Things. IEEE International Conference on Communications (ICC). IEEE. DOI= http:\/\/dx.doi.org\/10","author":"Arfaoui A.","year":"2019","unstructured":"Arfaoui , A. , Cherkaoui , S. , Kribeche , A. and Senouci S. M . 2019 . Context-Aware Adaptive Authentication and Authorization in Internet of Things. IEEE International Conference on Communications (ICC). IEEE. DOI= http:\/\/dx.doi.org\/10 .1109\/ICC. 2019 .8761830. 10.1109\/ICC.2019.8761830 Arfaoui, A., Cherkaoui, S., Kribeche, A. and Senouci S. M. 2019. Context-Aware Adaptive Authentication and Authorization in Internet of Things. IEEE International Conference on Communications (ICC). IEEE. DOI= http:\/\/dx.doi.org\/10.1109\/ICC.2019.8761830."},{"key":"e_1_3_2_1_15_1","volume-title":"Efficient Reasoning for Inconsistent Horn Formulae. European Conference on Logics in Artificial Intelligence. Springer, Cham. DOI= http:\/\/dx.doi.org\/ 10","author":"Marques-Silva J.","year":"2016","unstructured":"Marques-Silva , J. , Ignatiev , A. , Carlos Menc\u00eda , and Rafael Pe\u00f1aloza. 2016 . Efficient Reasoning for Inconsistent Horn Formulae. European Conference on Logics in Artificial Intelligence. Springer, Cham. DOI= http:\/\/dx.doi.org\/ 10 .1007\/978-3-319-48758-8_22. 10.1007\/978-3-319-48758-8_22 Marques-Silva, J., Ignatiev, A., Carlos Menc\u00eda, and Rafael Pe\u00f1aloza. 2016. Efficient Reasoning for Inconsistent Horn Formulae. European Conference on Logics in Artificial Intelligence. Springer, Cham. DOI= http:\/\/dx.doi.org\/ 10.1007\/978-3-319-48758-8_22."}],"event":{"name":"ICNCC 2019: 2019 The 8th International Conference on Networks, Communication and Computing","acronym":"ICNCC 2019","location":"Luoyang China"},"container-title":["Proceedings of the 2019 8th International Conference on Networks, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375998.3376026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375998.3376026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:15Z","timestamp":1750199595000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375998.3376026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,13]]},"references-count":17,"alternative-id":["10.1145\/3375998.3376026","10.1145\/3375998"],"URL":"https:\/\/doi.org\/10.1145\/3375998.3376026","relation":{},"subject":[],"published":{"date-parts":[[2019,12,13]]},"assertion":[{"value":"2020-01-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}