{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:29:25Z","timestamp":1763663365913,"version":"3.37.3"},"reference-count":33,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2011-0025588","2012M3C4A7033346","2013-054401"],"award-info":[{"award-number":["2011-0025588","2012M3C4A7033346","2013-054401"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Science, ICT & Future Planning","award":["2011-0025588","2012M3C4A7033346","2013-054401"],"award-info":[{"award-number":["2011-0025588","2012M3C4A7033346","2013-054401"]}]},{"name":"NRF Joint Research Program","award":["2011-0025588","2012M3C4A7033346","2013-054401"],"award-info":[{"award-number":["2011-0025588","2012M3C4A7033346","2013-054401"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,9,1]]},"abstract":"<jats:p> Currently, access control is facing many issues for information protection in the ubiquitous sensor network (USN) environment. In particular, dynamic access control is a central problem where context always changes because of volatile ubiquitous sensors. The use of context is important in USN. In this paper, we focus on the context-driven privacy protection model. In context-based access control research, the access permission technique that uses context is being intensely investigated because of the ease with which various dynamic access permissions can be assigned in accordance with the various changes in context. A key feature of this approach is dynamic access control. Therefore, we propose a model for privacy preservation that is context-based dynamic access control that uses intuitive 5W1H for USN. According to this model, the access control strategy can be determined dynamically based on context elements and subject attributes, in addition to objects and operations, using access control entities; therefore, it is relatively easy to infer the dynamic access control of context expressivity both accurately and efficiently. <\/jats:p>","DOI":"10.1155\/2015\/836546","type":"journal-article","created":{"date-parts":[[2015,9,27]],"date-time":"2015-09-27T21:03:51Z","timestamp":1443387831000},"page":"836546","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["CBDAC: Context-Based Dynamic Access Control Model Using Intuitive 5W1H for Ubiquitous Sensor Network"],"prefix":"10.1177","volume":"11","author":[{"given":"Jiseong","family":"Son","sequence":"first","affiliation":[{"name":"Department of Computer and Radio Communications Engineering, Korea University, Seoul 136-713, Republic of Korea"}]},{"given":"Jeong-Dong","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer and Radio Communications Engineering, Korea University, Seoul 136-713, Republic of Korea"}]},{"given":"Hong-Seok","family":"Na","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Communication, The Cyber University of Korea, Seoul 136-713, Republic of Korea"}]},{"given":"Doo-Kwon","family":"Baik","sequence":"additional","affiliation":[{"name":"Department of Computer and Radio Communications Engineering, Korea University, Seoul 136-713, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2015,9,27]]},"reference":[{"doi-asserted-by":"publisher","key":"B1-2015-836546","DOI":"10.1016\/j.jnca.2007.01.004"},{"doi-asserted-by":"publisher","key":"B2-2015-836546","DOI":"10.1016\/j.comcom.2005.11.018"},{"doi-asserted-by":"publisher","key":"B3-2015-836546","DOI":"10.1007\/0-306-47005-5_3"},{"volume-title":"Proceedings of the Workshop on Mobile Computing Systems and Applications","author":"Schilit B.","first-page":"85","key":"B4-2015-836546"},{"doi-asserted-by":"publisher","key":"B5-2015-836546","DOI":"10.1016\/s0097-8493(99)00120-x"},{"doi-asserted-by":"publisher","key":"B6-2015-836546","DOI":"10.1111\/0824-7935.00046"},{"doi-asserted-by":"publisher","key":"B8-2015-836546","DOI":"10.1109\/VETECS.2004.1391402"},{"doi-asserted-by":"publisher","key":"B9-2015-836546","DOI":"10.1109\/MPRV.2002.1158281"},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI \u201899)","author":"Salber D.","first-page":"434","key":"B10-2015-836546"},{"doi-asserted-by":"publisher","key":"B11-2015-836546","DOI":"10.1155\/2012\/247346"},{"volume-title":"Role-Based Access Control","year":"2003","author":"Ferraiolo D. F.","key":"B13-2015-836546"},{"doi-asserted-by":"publisher","key":"B14-2015-836546","DOI":"10.1145\/501978.501980"},{"doi-asserted-by":"publisher","key":"B15-2015-836546","DOI":"10.7763\/IJCTE.2011.V3.279"},{"volume-title":"Proceedings of the 28th International Conference on Very Large Data Bases (VLDB \u201802)","author":"Agrawal R.","first-page":"143","key":"B16-2015-836546"},{"doi-asserted-by":"publisher","key":"B17-2015-836546","DOI":"10.1109\/ISEC.2002.1166906"},{"volume-title":"Proceedings of the 30th International Conference on Very Large Databases (VLDB \u201804)","author":"LeFevre K.","key":"B19-2015-836546"},{"doi-asserted-by":"publisher","key":"B20-2015-836546","DOI":"10.1016\/j.eswa.2010.07.057"},{"doi-asserted-by":"publisher","key":"B21-2015-836546","DOI":"10.1109\/titb.2003.816562"},{"volume-title":"Proceedings of the ACM Workshop on Formal Methods in Security Engineering (FMSE \u201804)","author":"Wang L.","first-page":"45","key":"B22-2015-836546"},{"doi-asserted-by":"publisher","key":"B23-2015-836546","DOI":"10.1145\/1210263.1210265"},{"doi-asserted-by":"publisher","key":"B24-2015-836546","DOI":"10.1109\/TKDE.2005.1"},{"doi-asserted-by":"publisher","key":"B25-2015-836546","DOI":"10.1109\/ipc.2007.28"},{"volume-title":"Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS \u201804)","author":"Zhang G.","key":"B26-2015-836546"},{"doi-asserted-by":"publisher","key":"B27-2015-836546","DOI":"10.1145\/1609956.1609962"},{"doi-asserted-by":"publisher","key":"B28-2015-836546","DOI":"10.1007\/s11277-009-9782-4"},{"doi-asserted-by":"publisher","key":"B29-2015-836546","DOI":"10.1016\/j.datak.2011.03.006"},{"volume-title":"Proceedings of the 3rd ACM Workshop on Role-Based Access Control","author":"Goh C.","first-page":"55","key":"B30-2015-836546"},{"doi-asserted-by":"publisher","key":"B31-2015-836546","DOI":"10.1145\/567331.567336"},{"doi-asserted-by":"publisher","key":"B32-2015-836546","DOI":"10.1109\/2.485845"},{"volume-title":"Proceedings of the 1st ACM Workshop on Role-Based Access Control","author":"Chen F.","key":"B33-2015-836546"},{"doi-asserted-by":"publisher","key":"B34-2015-836546","DOI":"10.1007\/s00778-006-0023-0"},{"doi-asserted-by":"publisher","key":"B35-2015-836546","DOI":"10.1109\/ispa.2008.80"},{"doi-asserted-by":"publisher","key":"B37-2015-836546","DOI":"10.12785\/amis\/080145"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/836546","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/836546","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/836546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T12:41:51Z","timestamp":1620391311000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/836546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,1]]},"references-count":33,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,9,1]]}},"alternative-id":["10.1155\/2015\/836546"],"URL":"https:\/\/doi.org\/10.1155\/2015\/836546","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,9,1]]}}}