{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:13:14Z","timestamp":1725779594225},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.91","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"753-762","source":"Crossref","is-referenced-by-count":8,"title":["A Semantic Policy Framework for Context-Aware Access Control Applications"],"prefix":"10.1109","author":[{"given":"A.S.M.","family":"Kayes","sequence":"first","affiliation":[]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Colman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295170"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064000"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377854"},{"key":"23","first-page":"282","article-title":"Context-aware access control for rdf graph stores","author":"costabello","year":"2012","journal-title":"ECAI"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.6.6.1152-1161"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"16","first-page":"361","article-title":"Lot-rbac: A location and timebased rbac model","author":"chandran","year":"2005","journal-title":"WiSE"},{"year":"0","key":"13"},{"journal-title":"Jess rule engine","year":"0","key":"14"},{"journal-title":"SWRL","year":"0","key":"11"},{"journal-title":"OWLED","article-title":"Sqwrl: A query language for owl","year":"2009","author":"o'connor","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2004.1347784"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"journal-title":"NIST report","article-title":"2010 economic analysis of rolebased access control","year":"2010","author":"o'connor","key":"1"},{"journal-title":"OWL","year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0023-0"},{"journal-title":"AHRQ Publication","article-title":"Privacy and security solutions for interoperable health information exchange: Nationwide summary","year":"2007","author":"dimitropoulos","key":"6"},{"journal-title":"PERCOMW Washington USA IEEE Computer Society","article-title":"Ontology based context modeling and reasoning using owl","year":"2004","author":"wang","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31448-3_34"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.02.001"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.06.002"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680911.pdf?arnumber=6680911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:51:02Z","timestamp":1490230262000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.91","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}