Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
Context-aware computing is an important aspect of the pervasive computing environment and its various dynamic context information brings new challenges to access control systems. In this paper a new access control model, relation based access control ( RelBAC ), is provided for context-aware environ...
Saved in:
Published in | Wireless personal communications Vol. 55; no. 1; pp. 5 - 17 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Boston
Springer US
01.09.2010
|
Subjects | |
Online Access | Get full text |
ISSN | 0929-6212 1572-834X |
DOI | 10.1007/s11277-009-9782-4 |
Cover
Abstract | Context-aware computing is an important aspect of the pervasive computing environment and its various dynamic context information brings new challenges to access control systems. In this paper a new access control model, relation based access control (
RelBAC
), is provided for context-aware environment with a domain specific Description Logic to formalize the model. The novelty of
RelBAC
is that permissions are formalized as binary relations between subjects and objects which could evolve with the dynamic contexts. The expressive power of
RelBAC
is illustrated in a case study of a project meeting event. |
---|---|
AbstractList | Context-aware computing is an important aspect of the pervasive computing environment and its various dynamic context information brings new challenges to access control systems. In this paper a new access control model, relation based access control (
RelBAC
), is provided for context-aware environment with a domain specific Description Logic to formalize the model. The novelty of
RelBAC
is that permissions are formalized as binary relations between subjects and objects which could evolve with the dynamic contexts. The expressive power of
RelBAC
is illustrated in a case study of a project meeting event. |
Author | Giunchiglia, Fausto Crispo, Bruno Zhang, Rui Song, Lingyang |
Author_xml | – sequence: 1 givenname: Rui surname: Zhang fullname: Zhang, Rui email: zhangrui326@gmail.com organization: College of Computer Science and Technology, Jilin University – sequence: 2 givenname: Fausto surname: Giunchiglia fullname: Giunchiglia, Fausto organization: DISI, University of Trento – sequence: 3 givenname: Bruno surname: Crispo fullname: Crispo, Bruno organization: DISI, University of Trento – sequence: 4 givenname: Lingyang surname: Song fullname: Song, Lingyang organization: Peking University |
BookMark | eNp9kM1KAzEURoNUsK0-gLt5gWiSmUwm7sZSq1ARRMGVIZ3clCnTpCSpP2_vtHXVRVeX-3HPhfON0MB5BwhdU3JDCRG3kVImBCZEYikqhoszNKRcMFzlxccADYlkEpeMsgs0inFFSE9JNkSfr9Dp1HqH73UEk9VNAzFmE-9S8N1dVrujKHv2BrrM-rBP4Cfh-lsH6Lf1Zptat8ym7qsN3q3BpUt0bnUX4ep_jtH7w_Rt8ojnL7OnST3HDauqhAXNGbGEG0sM5ZyALk1eFgWjFoxgwHLgRnJpheCLRSV5SQpuSiYaXurcsnyMxOFvE3yMAaxq2rT3SkG3naJE7WpSh5pU7652NamiJ-kRuQntWoffkww7MLG_dUsIauW3wfWCJ6A_k6t8Kw |
CitedBy_id | crossref_primary_10_1007_s10207_014_0229_x crossref_primary_10_1155_2015_836546 crossref_primary_10_1007_s11277_015_3094_7 crossref_primary_10_3390_s20092464 crossref_primary_10_3390_su13084124 crossref_primary_10_1007_s11277_013_1482_4 crossref_primary_10_1093_comjnl_bxv034 crossref_primary_10_1016_j_cose_2017_10_002 |
Cites_doi | 10.1109/ICDSC.2001.918969 10.1109/POLICY.2003.1206958 10.1109/MIS.2004.31 10.1109/TKDE.2005.1 10.1145/1210263.1210265 10.1007/978-3-540-39718-2_11 10.1145/1063979.1064000 10.1145/373256.373258 10.1109/IPC.2007.28 10.1007/978-3-540-70664-9_3 10.1109/SKG.2008.76 10.1145/1377836.1377854 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media, LLC. 2009 |
Copyright_xml | – notice: Springer Science+Business Media, LLC. 2009 |
DBID | AAYXX CITATION |
DOI | 10.1007/s11277-009-9782-4 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Journalism & Communications Engineering |
EISSN | 1572-834X |
EndPage | 17 |
ExternalDocumentID | 10_1007_s11277_009_9782_4 |
GroupedDBID | -5B -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29R 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEGXH AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EDO EIOEI EJD ESBYG FD6 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A U5U UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7X Z7Z Z81 Z83 Z88 Z8M Z8N Z8R Z8T Z8U Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ACMFV ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION |
ID | FETCH-LOGICAL-c288t-71320f05df0d1550ea6d364421fed72e23e5d959f775bb8956045d627c56a3f23 |
IEDL.DBID | U2A |
ISSN | 0929-6212 |
IngestDate | Thu Apr 24 23:04:08 EDT 2025 Tue Jul 01 01:08:38 EDT 2025 Fri Feb 21 02:31:57 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Access control |
Language | English |
License | http://www.springer.com/tdm |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c288t-71320f05df0d1550ea6d364421fed72e23e5d959f775bb8956045d627c56a3f23 |
PageCount | 13 |
ParticipantIDs | crossref_citationtrail_10_1007_s11277_009_9782_4 crossref_primary_10_1007_s11277_009_9782_4 springer_journals_10_1007_s11277_009_9782_4 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20100900 2010-9-00 |
PublicationDateYYYYMMDD | 2010-09-01 |
PublicationDate_xml | – month: 9 year: 2010 text: 20100900 |
PublicationDecade | 2010 |
PublicationPlace | Boston |
PublicationPlace_xml | – name: Boston |
PublicationSubtitle | An International Journal |
PublicationTitle | Wireless personal communications |
PublicationTitleAbbrev | Wireless Pers Commun |
PublicationYear | 2010 |
Publisher | Springer US |
Publisher_xml | – name: Springer US |
References | Emami, S. S., Amini, M., & Zokaei, S. (2007). A context-aware access control model for pervasive computing environments. Intelligent Pervasive Computing, 0, 51–56. http://doi.ieeecomputersociety.org/10.1109/IPC.2007.6 Ferraiolo, D. F., Sandhu, R. S., Gavrila, S. I., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. Information and System Security, 4(3), 224–274. URL:http://citeseer.ist.psu.edu/ferraiolo01proposed.html. Giunchiglia, F., Zhang, R., & Crispo, B. (2008). Relbac: Relation based access control. In: SKG ’08: Proceedings of the 2008 Fourth International Conference on Semantics, Knowledge and Grid (pp. 3–11). Washington, DC: IEEE Computer Society. http://dx.doi.org/10.1109/SKG.2008.76. Lampson, B. (1971). Protection. In: Proceedings of 5th Princeton Conference on Information Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1, pp. 18–24 JoshiJ.BertinoE.LatifU.GhafoorA.A generalized temporal role-based access control modelIEEE Transactions on Knowledge and Data Engineering200517142310.1109/TKDE.2005.1 Moyer, M. J., & Ahamad, M. (2001). Generalized role-based access control. In: ICDCS, pp. 391–398. Damianou, N., Dulay, N., Lupu, E. C., & Sloman, M. (2000). Ponder: A language for specifying security and management policies for distributed systems. Imperial College Research Report DoC 2000/1. URL:citeseer.ist.psu.edu/damianou00ponder.html. Hulsebosch, R. J., Salden, A. H., Bargh, M. S., Ebben, P. W. G., & Reitsma, J. (2005). Context sensitive access control. In: SACMAT ’05: Proceedings of the tenth ACM symposium on Access control models and technologies (pp. 111–119). New York, NY: ACM. http://doi.acm.org/10.1145/1063979.1064000. Kulkarni, D., & Tripathi, A. (2008). Context-aware role-based access control in pervasive computing systems. In: SACMAT, pp. 113–122. Giunchiglia, F., Marchese, M., & Zaihrayeu, I. (2007). Encoding classifications into lightweight ontologies. Journal of Data Semantics, 8. BaaderF.CalvaneseD.McGuinnessD. L.NardiD.& Patel-SchneiderP. F.The description logic handbook: Theory, implementation, and applications2003New YorkCambridge University Press1058.68107 Covington, M. J., Long, W., Srinivasan, S., Dev, A. K., Ahamad, M., & Abowd, G. D. (2001). Securing context-aware applications using environment roles. In: SACMAT ’01: Proceedings of the sixth ACM symposium on Access control models and technologies (pp. 10–20). New York, NY: ACM. http://doi.acm.org/10.1145/373256.373258 Damiani, M. L., Bertino, E., Catania, B., & Perlasca, P. (2007). Geo-rbac: A spatially aware rbac. ACM Transactions on Information and System Security, 10(1). Mccarthy, J. (1993). Notes on formalizing context. In: Proceedings of the Thirteenth International Joint conference on Artificial Intelligence (pp. 555–560). Morgan Kaufmann. UszokA.BradshawJ. M.JohnsonM.JeffersR.TateA.DaltonJ.AitkenS.Kaos policy management for semantic web servicesIEEE Intelligent Systems20041943241 Zhang, G., & Parashar, M. (2004). Context-aware dynamic access control for pervasive computing. http://citeseer.ist.psu.edu/687356.html. Kagal, L. (2002). Rei : A Policy Language for the Me-Centric Project. Tech. rep., HP Labs. http://www.hpl.hp.com/techreports/2002/HPL-2002-270.html. Kagal, L., Finin, T., & Joshi, A. (2003). A policy language for a pervasive computing environment. In:POLICY ’03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (p. 63). Washington, DC: IEEE Computer Society. Bouquet, P., Giunchiglia, F., Harmelen, F. V., Serafini, L., & Stuckenschmidt, H. (2003). C-owl: Contextualizing ontologies. In: Journal Of Web Semantics, Springer, pp. 164–179. Zhang, R., Artale, A., Giunchiglia, F., & Crispo, B. (2009). Using description logics in relation based access control. Tech. rep., University of Trento. http://eprints.biblio.unitn.it/archive/00001611/01/024.pdf. 9782_CR3 9782_CR2 9782_CR5 9782_CR4 9782_CR12 9782_CR10 J. Joshi (9782_CR11) 2005; 17 9782_CR20 9782_CR7 9782_CR6 9782_CR9 9782_CR8 9782_CR19 9782_CR18 9782_CR17 9782_CR16 9782_CR15 9782_CR14 (9782_CR1) 2003 9782_CR13 |
References_xml | – reference: Giunchiglia, F., Zhang, R., & Crispo, B. (2008). Relbac: Relation based access control. In: SKG ’08: Proceedings of the 2008 Fourth International Conference on Semantics, Knowledge and Grid (pp. 3–11). Washington, DC: IEEE Computer Society. http://dx.doi.org/10.1109/SKG.2008.76. – reference: Kulkarni, D., & Tripathi, A. (2008). Context-aware role-based access control in pervasive computing systems. In: SACMAT, pp. 113–122. – reference: Lampson, B. (1971). Protection. In: Proceedings of 5th Princeton Conference on Information Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1, pp. 18–24 – reference: Mccarthy, J. (1993). Notes on formalizing context. In: Proceedings of the Thirteenth International Joint conference on Artificial Intelligence (pp. 555–560). Morgan Kaufmann. – reference: Giunchiglia, F., Marchese, M., & Zaihrayeu, I. (2007). Encoding classifications into lightweight ontologies. Journal of Data Semantics, 8. – reference: Emami, S. S., Amini, M., & Zokaei, S. (2007). A context-aware access control model for pervasive computing environments. Intelligent Pervasive Computing, 0, 51–56. http://doi.ieeecomputersociety.org/10.1109/IPC.2007.6 – reference: Zhang, R., Artale, A., Giunchiglia, F., & Crispo, B. (2009). Using description logics in relation based access control. Tech. rep., University of Trento. http://eprints.biblio.unitn.it/archive/00001611/01/024.pdf. – reference: UszokA.BradshawJ. M.JohnsonM.JeffersR.TateA.DaltonJ.AitkenS.Kaos policy management for semantic web servicesIEEE Intelligent Systems20041943241 – reference: Covington, M. J., Long, W., Srinivasan, S., Dev, A. K., Ahamad, M., & Abowd, G. D. (2001). Securing context-aware applications using environment roles. In: SACMAT ’01: Proceedings of the sixth ACM symposium on Access control models and technologies (pp. 10–20). New York, NY: ACM. http://doi.acm.org/10.1145/373256.373258 – reference: Kagal, L. (2002). Rei : A Policy Language for the Me-Centric Project. Tech. rep., HP Labs. http://www.hpl.hp.com/techreports/2002/HPL-2002-270.html. – reference: Kagal, L., Finin, T., & Joshi, A. (2003). A policy language for a pervasive computing environment. In:POLICY ’03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (p. 63). Washington, DC: IEEE Computer Society. – reference: Moyer, M. J., & Ahamad, M. (2001). Generalized role-based access control. In: ICDCS, pp. 391–398. – reference: Hulsebosch, R. J., Salden, A. H., Bargh, M. S., Ebben, P. W. G., & Reitsma, J. (2005). Context sensitive access control. In: SACMAT ’05: Proceedings of the tenth ACM symposium on Access control models and technologies (pp. 111–119). New York, NY: ACM. http://doi.acm.org/10.1145/1063979.1064000. – reference: BaaderF.CalvaneseD.McGuinnessD. L.NardiD.& Patel-SchneiderP. F.The description logic handbook: Theory, implementation, and applications2003New YorkCambridge University Press1058.68107 – reference: Damianou, N., Dulay, N., Lupu, E. C., & Sloman, M. (2000). Ponder: A language for specifying security and management policies for distributed systems. Imperial College Research Report DoC 2000/1. URL:citeseer.ist.psu.edu/damianou00ponder.html. – reference: Ferraiolo, D. F., Sandhu, R. S., Gavrila, S. I., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. Information and System Security, 4(3), 224–274. URL:http://citeseer.ist.psu.edu/ferraiolo01proposed.html. – reference: JoshiJ.BertinoE.LatifU.GhafoorA.A generalized temporal role-based access control modelIEEE Transactions on Knowledge and Data Engineering200517142310.1109/TKDE.2005.1 – reference: Zhang, G., & Parashar, M. (2004). Context-aware dynamic access control for pervasive computing. http://citeseer.ist.psu.edu/687356.html. – reference: Damiani, M. L., Bertino, E., Catania, B., & Perlasca, P. (2007). Geo-rbac: A spatially aware rbac. ACM Transactions on Information and System Security, 10(1). – reference: Bouquet, P., Giunchiglia, F., Harmelen, F. V., Serafini, L., & Stuckenschmidt, H. (2003). C-owl: Contextualizing ontologies. In: Journal Of Web Semantics, Springer, pp. 164–179. – ident: 9782_CR17 doi: 10.1109/ICDSC.2001.918969 – ident: 9782_CR13 doi: 10.1109/POLICY.2003.1206958 – ident: 9782_CR18 doi: 10.1109/MIS.2004.31 – volume-title: The description logic handbook: Theory, implementation, and applications year: 2003 ident: 9782_CR1 – volume: 17 start-page: 4 issue: 1 year: 2005 ident: 9782_CR11 publication-title: IEEE Transactions on Knowledge and Data Engineering doi: 10.1109/TKDE.2005.1 – ident: 9782_CR4 doi: 10.1145/1210263.1210265 – ident: 9782_CR2 doi: 10.1007/978-3-540-39718-2_11 – ident: 9782_CR10 doi: 10.1145/1063979.1064000 – ident: 9782_CR12 – ident: 9782_CR15 – ident: 9782_CR16 – ident: 9782_CR19 – ident: 9782_CR20 – ident: 9782_CR3 doi: 10.1145/373256.373258 – ident: 9782_CR6 doi: 10.1109/IPC.2007.28 – ident: 9782_CR8 doi: 10.1007/978-3-540-70664-9_3 – ident: 9782_CR9 doi: 10.1109/SKG.2008.76 – ident: 9782_CR14 doi: 10.1145/1377836.1377854 – ident: 9782_CR7 – ident: 9782_CR5 |
SSID | ssj0010092 |
Score | 1.9230015 |
Snippet | Context-aware computing is an important aspect of the pervasive computing environment and its various dynamic context information brings new challenges to... |
SourceID | crossref springer |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 5 |
SubjectTerms | Communications Engineering Computer Communication Networks Engineering Networks Signal,Image and Speech Processing |
Title | Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment |
URI | https://link.springer.com/article/10.1007/s11277-009-9782-4 |
Volume | 55 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEB20vehBtCrWatmDeFACyWY3abylpbUo9mShXgxJdhcEjdJU_PvO5KO1ooKnwDJJYDazMy8z8wbgjCikYsWNhc49tgSeBjTIHQ0vkMaPHdcEkhqF7ybeeCpuZnJW9XHndbV7nZIsTupVs5tD6Ub6mY_Ih1tiE5oSoTtZ45SHy9QBsQgVBHtU14EHc53K_OkR685oPRNaOJjRLuxUkSELy63cgw2dtWD7C19gCzqV0FP-ws7ZWm9Hvg-PdWGb1UfXpFhYzEJkg7IY_YqF2bclRoPQnhmGrcUKYeDwI55rVo56wFey4aoP7gCmo-H9YGxV4xOslPd6C8un7mhjS2VsRUBEx55yMfzhjtHK55q7WqpABsb3ZZL0CCgJqTzup9KLXcPdQ2hkr5k-AmYQ5DhamBRNXgSpHTsikQjsEsd1lEpUG-xaj1FacYvTiIvnaMWKTKqPUPURqT4SbbhY3vJWEmv8JXxZb05U2Vj-u_Txv6Q7sFVWBFDd2Ak0FvN3fYqBxiLpQjMc9fsTul4_3A67xYf2Cayfy6I |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgHIADggFijEcOiAOoUpsmfXArE9OAbadN2omobRIJaRS0DvH3ifvYGAIkrpHbSk4c27X9fQAXCCEVS6ot49xji5nbAIncjeGFXPux4-qQ46DwYOj1xuxhwifVHHded7vXJcnipl4OuzlYbsSf-SbzoRZbhw0TCwRIWzCm0aJ0gChCBcAe9nWYi7kuZf70ilVntFoJLRxMdxd2qsiQROVW7sGaypqw_QUvsAntSug5fyGXZGW2I9-Hp7qxzbo1rkmSqOBCJJ2yGf2GRNm3JYJEaFNiwtZiBXPg6COeKVJSPZhPkrvlHNwBjLt3o07PqugTrJQGwdzycTpa21xqW2IiomJPuib8oY5W0qeKuorLkIfa93mSBJgoMS496qfci11N3UNoZK-ZOgKiTZLjKKZTY_IsTO3YYQk3iV3iuI6UiWyBXetRpBW2OFJcTMUSFRlVL4zqBapesBZcLR55K4E1_hK-rjdHVDaW_y59_C_pc9jsjQZ90b8fPrZhq-wOwB6yE2jMZ-_q1AQd8-SsOGSfp9zLhQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB60guhBtCrW-tiDeFCCzSabNN5ibamv4sFCT4YkuwtCjaWJ-PedyaO1ooLXZZLA7M7OTGbm-wBOCEIqlFwb6NxDw8bbgIjc0fA8od3QtLQnaFD4YeD0h_btSIxKntO06navSpLFTAOhNCXZxUTqi_ngm0mlR_qxj1kQN-xlWMHb2KSDPuT-rIxAiEI52B71eOAlXZU1f3rFomNarIrmzqa3CRtllMj8Ylu3YEkldVj_gh1Yh2Yp9JK-slO2MOeRbsNz1eRmXKGbkszPeRFZp2hMv2R-8m2JESnamGEIm69QPux_hFPFCtoH_CTrzmfidmDY6z51-kZJpWDEvN3ODJcmpXVLSN2SlJSo0JEWhkLc1Eq6XHFLCekJT7uuiKI2JU22kA53Y-GElubWLtSSt0TtAdOY8JjK1jGav-3FrdC0I4FJXoT6lzKSDWhVegziEmec6C7GwRwhmVQfoOoDUn1gN-Bs9sikANn4S_i82pygtLf0d-n9f0kfw-rjdS-4vxncNWGtaBSgdrIDqGXTd3WI8UcWHeVn7BOwiM_B |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Relation-Based+Access+Control%3A+An+Access+Control+Model+for+Context-Aware+Computing+Environment&rft.jtitle=Wireless+personal+communications&rft.au=Zhang%2C+Rui&rft.au=Giunchiglia%2C+Fausto&rft.au=Crispo%2C+Bruno&rft.au=Song%2C+Lingyang&rft.date=2010-09-01&rft.pub=Springer+US&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=55&rft.issue=1&rft.spage=5&rft.epage=17&rft_id=info:doi/10.1007%2Fs11277-009-9782-4&rft.externalDocID=10_1007_s11277_009_9782_4 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon |