{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T21:26:15Z","timestamp":1725398775300},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/ccnc.2012.6181011","type":"proceedings-article","created":{"date-parts":[[2012,4,13]],"date-time":"2012-04-13T19:39:34Z","timestamp":1334345974000},"page":"380-384","source":"Crossref","is-referenced-by-count":3,"title":["Enforcing privacy as access control in a pervasive context"],"prefix":"10.1109","author":[{"given":"Aurelien","family":"Faravelon","sequence":"first","affiliation":[]},{"given":"Stephanie","family":"Chollet","sequence":"additional","affiliation":[]},{"given":"Christine","family":"Verdier","sequence":"additional","affiliation":[]},{"given":"Agnes","family":"Front","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78499-9_14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.35"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-88074-1.50021-4"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1125808.1125810"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WISE.2003.1254461"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065547"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/567331.567336"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2007.31"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2006.115"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.14"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766718"},{"key":"8","first-page":"239","article-title":"A secure workflow management system (swms) for e-government web based application","author":"hashem","year":"2010","journal-title":"CSREA EEE"}],"event":{"name":"2012 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2012,1,14]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2012,1,17]]}},"container-title":["2012 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6175264\/6180955\/06181011.pdf?arnumber=6181011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T14:21:51Z","timestamp":1490106111000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6181011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2012.6181011","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}