Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment

Context-aware computing is an important aspect of the pervasive computing environment and its various dynamic context information brings new challenges to access control systems. In this paper a new access control model, relation based access control ( RelBAC ), is provided for context-aware environ...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 55; no. 1; pp. 5 - 17
Main Authors Zhang, Rui, Giunchiglia, Fausto, Crispo, Bruno, Song, Lingyang
Format Journal Article
LanguageEnglish
Published Boston Springer US 01.09.2010
Subjects
Online AccessGet full text
ISSN0929-6212
1572-834X
DOI10.1007/s11277-009-9782-4

Cover

Abstract Context-aware computing is an important aspect of the pervasive computing environment and its various dynamic context information brings new challenges to access control systems. In this paper a new access control model, relation based access control ( RelBAC ), is provided for context-aware environment with a domain specific Description Logic to formalize the model. The novelty of RelBAC is that permissions are formalized as binary relations between subjects and objects which could evolve with the dynamic contexts. The expressive power of RelBAC is illustrated in a case study of a project meeting event.
AbstractList Context-aware computing is an important aspect of the pervasive computing environment and its various dynamic context information brings new challenges to access control systems. In this paper a new access control model, relation based access control ( RelBAC ), is provided for context-aware environment with a domain specific Description Logic to formalize the model. The novelty of RelBAC is that permissions are formalized as binary relations between subjects and objects which could evolve with the dynamic contexts. The expressive power of RelBAC is illustrated in a case study of a project meeting event.
Author Giunchiglia, Fausto
Crispo, Bruno
Zhang, Rui
Song, Lingyang
Author_xml – sequence: 1
  givenname: Rui
  surname: Zhang
  fullname: Zhang, Rui
  email: zhangrui326@gmail.com
  organization: College of Computer Science and Technology, Jilin University
– sequence: 2
  givenname: Fausto
  surname: Giunchiglia
  fullname: Giunchiglia, Fausto
  organization: DISI, University of Trento
– sequence: 3
  givenname: Bruno
  surname: Crispo
  fullname: Crispo, Bruno
  organization: DISI, University of Trento
– sequence: 4
  givenname: Lingyang
  surname: Song
  fullname: Song, Lingyang
  organization: Peking University
BookMark eNp9kM1KAzEURoNUsK0-gLt5gWiSmUwm7sZSq1ARRMGVIZ3clCnTpCSpP2_vtHXVRVeX-3HPhfON0MB5BwhdU3JDCRG3kVImBCZEYikqhoszNKRcMFzlxccADYlkEpeMsgs0inFFSE9JNkSfr9Dp1HqH73UEk9VNAzFmE-9S8N1dVrujKHv2BrrM-rBP4Cfh-lsH6Lf1Zptat8ym7qsN3q3BpUt0bnUX4ep_jtH7w_Rt8ojnL7OnST3HDauqhAXNGbGEG0sM5ZyALk1eFgWjFoxgwHLgRnJpheCLRSV5SQpuSiYaXurcsnyMxOFvE3yMAaxq2rT3SkG3naJE7WpSh5pU7652NamiJ-kRuQntWoffkww7MLG_dUsIauW3wfWCJ6A_k6t8Kw
CitedBy_id crossref_primary_10_1007_s10207_014_0229_x
crossref_primary_10_1155_2015_836546
crossref_primary_10_1007_s11277_015_3094_7
crossref_primary_10_3390_s20092464
crossref_primary_10_3390_su13084124
crossref_primary_10_1007_s11277_013_1482_4
crossref_primary_10_1093_comjnl_bxv034
crossref_primary_10_1016_j_cose_2017_10_002
Cites_doi 10.1109/ICDSC.2001.918969
10.1109/POLICY.2003.1206958
10.1109/MIS.2004.31
10.1109/TKDE.2005.1
10.1145/1210263.1210265
10.1007/978-3-540-39718-2_11
10.1145/1063979.1064000
10.1145/373256.373258
10.1109/IPC.2007.28
10.1007/978-3-540-70664-9_3
10.1109/SKG.2008.76
10.1145/1377836.1377854
ContentType Journal Article
Copyright Springer Science+Business Media, LLC. 2009
Copyright_xml – notice: Springer Science+Business Media, LLC. 2009
DBID AAYXX
CITATION
DOI 10.1007/s11277-009-9782-4
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Journalism & Communications
Engineering
EISSN 1572-834X
EndPage 17
ExternalDocumentID 10_1007_s11277_009_9782_4
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29R
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEGXH
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FD6
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P9P
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
U5U
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACMFV
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
ID FETCH-LOGICAL-c288t-71320f05df0d1550ea6d364421fed72e23e5d959f775bb8956045d627c56a3f23
IEDL.DBID U2A
ISSN 0929-6212
IngestDate Thu Apr 24 23:04:08 EDT 2025
Tue Jul 01 01:08:38 EDT 2025
Fri Feb 21 02:31:57 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Access control
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c288t-71320f05df0d1550ea6d364421fed72e23e5d959f775bb8956045d627c56a3f23
PageCount 13
ParticipantIDs crossref_citationtrail_10_1007_s11277_009_9782_4
crossref_primary_10_1007_s11277_009_9782_4
springer_journals_10_1007_s11277_009_9782_4
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20100900
2010-9-00
PublicationDateYYYYMMDD 2010-09-01
PublicationDate_xml – month: 9
  year: 2010
  text: 20100900
PublicationDecade 2010
PublicationPlace Boston
PublicationPlace_xml – name: Boston
PublicationSubtitle An International Journal
PublicationTitle Wireless personal communications
PublicationTitleAbbrev Wireless Pers Commun
PublicationYear 2010
Publisher Springer US
Publisher_xml – name: Springer US
References Emami, S. S., Amini, M., & Zokaei, S. (2007). A context-aware access control model for pervasive computing environments. Intelligent Pervasive Computing, 0, 51–56. http://doi.ieeecomputersociety.org/10.1109/IPC.2007.6
Ferraiolo, D. F., Sandhu, R. S., Gavrila, S. I., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. Information and System Security, 4(3), 224–274. URL:http://citeseer.ist.psu.edu/ferraiolo01proposed.html.
Giunchiglia, F., Zhang, R., & Crispo, B. (2008). Relbac: Relation based access control. In: SKG ’08: Proceedings of the 2008 Fourth International Conference on Semantics, Knowledge and Grid (pp. 3–11). Washington, DC: IEEE Computer Society. http://dx.doi.org/10.1109/SKG.2008.76.
Lampson, B. (1971). Protection. In: Proceedings of 5th Princeton Conference on Information Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1, pp. 18–24
JoshiJ.BertinoE.LatifU.GhafoorA.A generalized temporal role-based access control modelIEEE Transactions on Knowledge and Data Engineering200517142310.1109/TKDE.2005.1
Moyer, M. J., & Ahamad, M. (2001). Generalized role-based access control. In: ICDCS, pp. 391–398.
Damianou, N., Dulay, N., Lupu, E. C., & Sloman, M. (2000). Ponder: A language for specifying security and management policies for distributed systems. Imperial College Research Report DoC 2000/1. URL:citeseer.ist.psu.edu/damianou00ponder.html.
Hulsebosch, R. J., Salden, A. H., Bargh, M. S., Ebben, P. W. G., & Reitsma, J. (2005). Context sensitive access control. In: SACMAT ’05: Proceedings of the tenth ACM symposium on Access control models and technologies (pp. 111–119). New York, NY: ACM. http://doi.acm.org/10.1145/1063979.1064000.
Kulkarni, D., & Tripathi, A. (2008). Context-aware role-based access control in pervasive computing systems. In: SACMAT, pp. 113–122.
Giunchiglia, F., Marchese, M., & Zaihrayeu, I. (2007). Encoding classifications into lightweight ontologies. Journal of Data Semantics, 8.
BaaderF.CalvaneseD.McGuinnessD. L.NardiD.& Patel-SchneiderP. F.The description logic handbook: Theory, implementation, and applications2003New YorkCambridge University Press1058.68107
Covington, M. J., Long, W., Srinivasan, S., Dev, A. K., Ahamad, M., & Abowd, G. D. (2001). Securing context-aware applications using environment roles. In: SACMAT ’01: Proceedings of the sixth ACM symposium on Access control models and technologies (pp. 10–20). New York, NY: ACM. http://doi.acm.org/10.1145/373256.373258
Damiani, M. L., Bertino, E., Catania, B., & Perlasca, P. (2007). Geo-rbac: A spatially aware rbac. ACM Transactions on Information and System Security, 10(1).
Mccarthy, J. (1993). Notes on formalizing context. In: Proceedings of the Thirteenth International Joint conference on Artificial Intelligence (pp. 555–560). Morgan Kaufmann.
UszokA.BradshawJ. M.JohnsonM.JeffersR.TateA.DaltonJ.AitkenS.Kaos policy management for semantic web servicesIEEE Intelligent Systems20041943241
Zhang, G., & Parashar, M. (2004). Context-aware dynamic access control for pervasive computing. http://citeseer.ist.psu.edu/687356.html.
Kagal, L. (2002). Rei : A Policy Language for the Me-Centric Project. Tech. rep., HP Labs. http://www.hpl.hp.com/techreports/2002/HPL-2002-270.html.
Kagal, L., Finin, T., & Joshi, A. (2003). A policy language for a pervasive computing environment. In:POLICY ’03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (p. 63). Washington, DC: IEEE Computer Society.
Bouquet, P., Giunchiglia, F., Harmelen, F. V., Serafini, L., & Stuckenschmidt, H. (2003). C-owl: Contextualizing ontologies. In: Journal Of Web Semantics, Springer, pp. 164–179.
Zhang, R., Artale, A., Giunchiglia, F., & Crispo, B. (2009). Using description logics in relation based access control. Tech. rep., University of Trento. http://eprints.biblio.unitn.it/archive/00001611/01/024.pdf.
9782_CR3
9782_CR2
9782_CR5
9782_CR4
9782_CR12
9782_CR10
J. Joshi (9782_CR11) 2005; 17
9782_CR20
9782_CR7
9782_CR6
9782_CR9
9782_CR8
9782_CR19
9782_CR18
9782_CR17
9782_CR16
9782_CR15
9782_CR14
(9782_CR1) 2003
9782_CR13
References_xml – reference: Giunchiglia, F., Zhang, R., & Crispo, B. (2008). Relbac: Relation based access control. In: SKG ’08: Proceedings of the 2008 Fourth International Conference on Semantics, Knowledge and Grid (pp. 3–11). Washington, DC: IEEE Computer Society. http://dx.doi.org/10.1109/SKG.2008.76.
– reference: Kulkarni, D., & Tripathi, A. (2008). Context-aware role-based access control in pervasive computing systems. In: SACMAT, pp. 113–122.
– reference: Lampson, B. (1971). Protection. In: Proceedings of 5th Princeton Conference on Information Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1, pp. 18–24
– reference: Mccarthy, J. (1993). Notes on formalizing context. In: Proceedings of the Thirteenth International Joint conference on Artificial Intelligence (pp. 555–560). Morgan Kaufmann.
– reference: Giunchiglia, F., Marchese, M., & Zaihrayeu, I. (2007). Encoding classifications into lightweight ontologies. Journal of Data Semantics, 8.
– reference: Emami, S. S., Amini, M., & Zokaei, S. (2007). A context-aware access control model for pervasive computing environments. Intelligent Pervasive Computing, 0, 51–56. http://doi.ieeecomputersociety.org/10.1109/IPC.2007.6
– reference: Zhang, R., Artale, A., Giunchiglia, F., & Crispo, B. (2009). Using description logics in relation based access control. Tech. rep., University of Trento. http://eprints.biblio.unitn.it/archive/00001611/01/024.pdf.
– reference: UszokA.BradshawJ. M.JohnsonM.JeffersR.TateA.DaltonJ.AitkenS.Kaos policy management for semantic web servicesIEEE Intelligent Systems20041943241
– reference: Covington, M. J., Long, W., Srinivasan, S., Dev, A. K., Ahamad, M., & Abowd, G. D. (2001). Securing context-aware applications using environment roles. In: SACMAT ’01: Proceedings of the sixth ACM symposium on Access control models and technologies (pp. 10–20). New York, NY: ACM. http://doi.acm.org/10.1145/373256.373258
– reference: Kagal, L. (2002). Rei : A Policy Language for the Me-Centric Project. Tech. rep., HP Labs. http://www.hpl.hp.com/techreports/2002/HPL-2002-270.html.
– reference: Kagal, L., Finin, T., & Joshi, A. (2003). A policy language for a pervasive computing environment. In:POLICY ’03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (p. 63). Washington, DC: IEEE Computer Society.
– reference: Moyer, M. J., & Ahamad, M. (2001). Generalized role-based access control. In: ICDCS, pp. 391–398.
– reference: Hulsebosch, R. J., Salden, A. H., Bargh, M. S., Ebben, P. W. G., & Reitsma, J. (2005). Context sensitive access control. In: SACMAT ’05: Proceedings of the tenth ACM symposium on Access control models and technologies (pp. 111–119). New York, NY: ACM. http://doi.acm.org/10.1145/1063979.1064000.
– reference: BaaderF.CalvaneseD.McGuinnessD. L.NardiD.& Patel-SchneiderP. F.The description logic handbook: Theory, implementation, and applications2003New YorkCambridge University Press1058.68107
– reference: Damianou, N., Dulay, N., Lupu, E. C., & Sloman, M. (2000). Ponder: A language for specifying security and management policies for distributed systems. Imperial College Research Report DoC 2000/1. URL:citeseer.ist.psu.edu/damianou00ponder.html.
– reference: Ferraiolo, D. F., Sandhu, R. S., Gavrila, S. I., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. Information and System Security, 4(3), 224–274. URL:http://citeseer.ist.psu.edu/ferraiolo01proposed.html.
– reference: JoshiJ.BertinoE.LatifU.GhafoorA.A generalized temporal role-based access control modelIEEE Transactions on Knowledge and Data Engineering200517142310.1109/TKDE.2005.1
– reference: Zhang, G., & Parashar, M. (2004). Context-aware dynamic access control for pervasive computing. http://citeseer.ist.psu.edu/687356.html.
– reference: Damiani, M. L., Bertino, E., Catania, B., & Perlasca, P. (2007). Geo-rbac: A spatially aware rbac. ACM Transactions on Information and System Security, 10(1).
– reference: Bouquet, P., Giunchiglia, F., Harmelen, F. V., Serafini, L., & Stuckenschmidt, H. (2003). C-owl: Contextualizing ontologies. In: Journal Of Web Semantics, Springer, pp. 164–179.
– ident: 9782_CR17
  doi: 10.1109/ICDSC.2001.918969
– ident: 9782_CR13
  doi: 10.1109/POLICY.2003.1206958
– ident: 9782_CR18
  doi: 10.1109/MIS.2004.31
– volume-title: The description logic handbook: Theory, implementation, and applications
  year: 2003
  ident: 9782_CR1
– volume: 17
  start-page: 4
  issue: 1
  year: 2005
  ident: 9782_CR11
  publication-title: IEEE Transactions on Knowledge and Data Engineering
  doi: 10.1109/TKDE.2005.1
– ident: 9782_CR4
  doi: 10.1145/1210263.1210265
– ident: 9782_CR2
  doi: 10.1007/978-3-540-39718-2_11
– ident: 9782_CR10
  doi: 10.1145/1063979.1064000
– ident: 9782_CR12
– ident: 9782_CR15
– ident: 9782_CR16
– ident: 9782_CR19
– ident: 9782_CR20
– ident: 9782_CR3
  doi: 10.1145/373256.373258
– ident: 9782_CR6
  doi: 10.1109/IPC.2007.28
– ident: 9782_CR8
  doi: 10.1007/978-3-540-70664-9_3
– ident: 9782_CR9
  doi: 10.1109/SKG.2008.76
– ident: 9782_CR14
  doi: 10.1145/1377836.1377854
– ident: 9782_CR7
– ident: 9782_CR5
SSID ssj0010092
Score 1.9230015
Snippet Context-aware computing is an important aspect of the pervasive computing environment and its various dynamic context information brings new challenges to...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 5
SubjectTerms Communications Engineering
Computer Communication Networks
Engineering
Networks
Signal,Image and Speech Processing
Title Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
URI https://link.springer.com/article/10.1007/s11277-009-9782-4
Volume 55
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEB20vehBtCrWatmDeFACyWY3abylpbUo9mShXgxJdhcEjdJU_PvO5KO1ooKnwDJJYDazMy8z8wbgjCikYsWNhc49tgSeBjTIHQ0vkMaPHdcEkhqF7ybeeCpuZnJW9XHndbV7nZIsTupVs5tD6Ub6mY_Ih1tiE5oSoTtZ45SHy9QBsQgVBHtU14EHc53K_OkR685oPRNaOJjRLuxUkSELy63cgw2dtWD7C19gCzqV0FP-ws7ZWm9Hvg-PdWGb1UfXpFhYzEJkg7IY_YqF2bclRoPQnhmGrcUKYeDwI55rVo56wFey4aoP7gCmo-H9YGxV4xOslPd6C8un7mhjS2VsRUBEx55yMfzhjtHK55q7WqpABsb3ZZL0CCgJqTzup9KLXcPdQ2hkr5k-AmYQ5DhamBRNXgSpHTsikQjsEsd1lEpUG-xaj1FacYvTiIvnaMWKTKqPUPURqT4SbbhY3vJWEmv8JXxZb05U2Vj-u_Txv6Q7sFVWBFDd2Ak0FvN3fYqBxiLpQjMc9fsTul4_3A67xYf2Cayfy6I
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgHIADggFijEcOiAOoUpsmfXArE9OAbadN2omobRIJaRS0DvH3ifvYGAIkrpHbSk4c27X9fQAXCCEVS6ot49xji5nbAIncjeGFXPux4-qQ46DwYOj1xuxhwifVHHded7vXJcnipl4OuzlYbsSf-SbzoRZbhw0TCwRIWzCm0aJ0gChCBcAe9nWYi7kuZf70ilVntFoJLRxMdxd2qsiQROVW7sGaypqw_QUvsAntSug5fyGXZGW2I9-Hp7qxzbo1rkmSqOBCJJ2yGf2GRNm3JYJEaFNiwtZiBXPg6COeKVJSPZhPkrvlHNwBjLt3o07PqugTrJQGwdzycTpa21xqW2IiomJPuib8oY5W0qeKuorLkIfa93mSBJgoMS496qfci11N3UNoZK-ZOgKiTZLjKKZTY_IsTO3YYQk3iV3iuI6UiWyBXetRpBW2OFJcTMUSFRlVL4zqBapesBZcLR55K4E1_hK-rjdHVDaW_y59_C_pc9jsjQZ90b8fPrZhq-wOwB6yE2jMZ-_q1AQd8-SsOGSfp9zLhQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB60guhBtCrW-tiDeFCCzSabNN5ibamv4sFCT4YkuwtCjaWJ-PedyaO1ooLXZZLA7M7OTGbm-wBOCEIqlFwb6NxDw8bbgIjc0fA8od3QtLQnaFD4YeD0h_btSIxKntO06navSpLFTAOhNCXZxUTqi_ngm0mlR_qxj1kQN-xlWMHb2KSDPuT-rIxAiEI52B71eOAlXZU1f3rFomNarIrmzqa3CRtllMj8Ylu3YEkldVj_gh1Yh2Yp9JK-slO2MOeRbsNz1eRmXKGbkszPeRFZp2hMv2R-8m2JESnamGEIm69QPux_hFPFCtoH_CTrzmfidmDY6z51-kZJpWDEvN3ODJcmpXVLSN2SlJSo0JEWhkLc1Eq6XHFLCekJT7uuiKI2JU22kA53Y-GElubWLtSSt0TtAdOY8JjK1jGav-3FrdC0I4FJXoT6lzKSDWhVegziEmec6C7GwRwhmVQfoOoDUn1gN-Bs9sikANn4S_i82pygtLf0d-n9f0kfw-rjdS-4vxncNWGtaBSgdrIDqGXTd3WI8UcWHeVn7BOwiM_B
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Relation-Based+Access+Control%3A+An+Access+Control+Model+for+Context-Aware+Computing+Environment&rft.jtitle=Wireless+personal+communications&rft.au=Zhang%2C+Rui&rft.au=Giunchiglia%2C+Fausto&rft.au=Crispo%2C+Bruno&rft.au=Song%2C+Lingyang&rft.date=2010-09-01&rft.pub=Springer+US&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=55&rft.issue=1&rft.spage=5&rft.epage=17&rft_id=info:doi/10.1007%2Fs11277-009-9782-4&rft.externalDocID=10_1007_s11277_009_9782_4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon