{"id":"https://openalex.org/W2139951669","doi":"https://doi.org/10.1109/icitst.2009.5402550","title":"Context-sensitive authorization for asynchronous communications","display_name":"Context-sensitive authorization for asynchronous communications","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2139951669","doi":"https://doi.org/10.1109/icitst.2009.5402550","mag":"2139951669"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2009.5402550","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402550","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088632550","display_name":"Vincent Hourdin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"V. Hourdin","raw_affiliation_strings":["Mobilegov-I3S1, France","Mobilegov -I3S, France"],"affiliations":[{"raw_affiliation_string":"Mobilegov-I3S1, France","institution_ids":[]},{"raw_affiliation_string":"Mobilegov -I3S, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044733748","display_name":"Jean\u2010Yves Tigli","orcid":"https://orcid.org/0000-0002-0531-6384"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"J.-Y. Tigli","raw_affiliation_strings":["Mobilegov-I3S1, France","I3S (UNS - CNRS), France"],"affiliations":[{"raw_affiliation_string":"Mobilegov-I3S1, France","institution_ids":[]},{"raw_affiliation_string":"I3S (UNS - CNRS), France","institution_ids":["https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040013879","display_name":"St\u00e9phane Lavirotte","orcid":"https://orcid.org/0000-0002-3341-6577"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"S. Lavirotte","raw_affiliation_strings":["Mobilegov-I3S1, France","I3S (UNS - CNRS), France"],"affiliations":[{"raw_affiliation_string":"Mobilegov-I3S1, France","institution_ids":[]},{"raw_affiliation_string":"I3S (UNS - CNRS), France","institution_ids":["https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109933065","display_name":"Ga\u00ebtan Rey","orcid":"https://orcid.org/0000-0003-4710-0474"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"G. Rey","raw_affiliation_strings":["Mobilegov-I3S1, France","I3S (UNS - CNRS), France"],"affiliations":[{"raw_affiliation_string":"Mobilegov-I3S1, France","institution_ids":[]},{"raw_affiliation_string":"I3S (UNS - CNRS), France","institution_ids":["https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005393325","display_name":"Michel Riveill","orcid":"https://orcid.org/0000-0001-6726-6637"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"M. Riveill","raw_affiliation_strings":["Mobilegov-I3S1, France","I3S (UNS - CNRS), France"],"affiliations":[{"raw_affiliation_string":"Mobilegov-I3S1, France","institution_ids":[]},{"raw_affiliation_string":"I3S (UNS - CNRS), France","institution_ids":["https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088632550"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.25774368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8097498416900635},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.7202579975128174},{"id":"https://openalex.org/keywords/universal-plug-and-play","display_name":"Universal Plug and Play","score":0.6310420036315918},{"id":"https://openalex.org/keywords/devices-profile-for-web-services","display_name":"Devices Profile for Web Services","score":0.5757964849472046},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5669445991516113},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.563396692276001},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5600651502609253},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.535521388053894},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.5278085470199585},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5274032950401306},{"id":"https://openalex.org/keywords/context-awareness","display_name":"Context awareness","score":0.47276169061660767},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.4711165428161621},{"id":"https://openalex.org/keywords/authorization-certificate","display_name":"Authorization certificate","score":0.4641590714454651},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4515121281147003},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40145108103752136},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.37568655610084534},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.1816835105419159},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.13806962966918945},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.13260677456855774},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.11813569068908691},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.08406701683998108}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8097498416900635},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.7202579975128174},{"id":"https://openalex.org/C177066171","wikidata":"https://www.wikidata.org/wiki/Q284935","display_name":"Universal Plug and Play","level":2,"score":0.6310420036315918},{"id":"https://openalex.org/C183979223","wikidata":"https://www.wikidata.org/wiki/Q1206782","display_name":"Devices Profile for Web Services","level":5,"score":0.5757964849472046},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5669445991516113},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.563396692276001},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5600651502609253},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.535521388053894},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.5278085470199585},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5274032950401306},{"id":"https://openalex.org/C2781368080","wikidata":"https://www.wikidata.org/wiki/Q501688","display_name":"Context awareness","level":3,"score":0.47276169061660767},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.4711165428161621},{"id":"https://openalex.org/C175093008","wikidata":"https://www.wikidata.org/wiki/Q758251","display_name":"Authorization certificate","level":5,"score":0.4641590714454651},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4515121281147003},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40145108103752136},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.37568655610084534},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.1816835105419159},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.13806962966918945},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.13260677456855774},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.11813569068908691},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.08406701683998108},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icitst.2009.5402550","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402550","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.188.1894","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.1894","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://stephane.lavirotte.com/research/biblio/hourdin-tigli-etal2009.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:hal-00476882v1","is_oa":false,"landing_page_url":"https://hal.science/hal-00476882","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"4th International Conference for Internet Technology and Secured Transactions, Nov 2009, Londres, United Kingdom","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1526290698","https://openalex.org/W1539259921","https://openalex.org/W1590740917","https://openalex.org/W1997199359","https://openalex.org/W2000952251","https://openalex.org/W2004078981","https://openalex.org/W2015046609","https://openalex.org/W2029414465","https://openalex.org/W2082164499","https://openalex.org/W2091443424","https://openalex.org/W2098931293","https://openalex.org/W2131000182","https://openalex.org/W2143238865","https://openalex.org/W3184218770"],"related_works":["https://openalex.org/W2095947146","https://openalex.org/W2211345530","https://openalex.org/W2202432454","https://openalex.org/W1553902753","https://openalex.org/W2107442112","https://openalex.org/W2057969524","https://openalex.org/W57335507","https://openalex.org/W4292139036","https://openalex.org/W2085450850","https://openalex.org/W2071504573"],"abstract_inverted_index":{"Main":[0],"requirement":[1],"of":[2,59],"recent":[3],"computing":[4],"environments,":[5],"like":[6,62],"mobile":[7],"and":[8,68],"then":[9],"ubiquitous":[10],"computing,":[11],"is":[12],"to":[13,16,48],"adapt":[14],"applications":[15],"context.":[17],"On":[18],"the":[19,32,52,57],"other":[20],"hand,":[21],"access":[22],"control":[23],"generally":[24],"trust":[25],"users":[26],"once":[27],"they":[28,35],"have":[29],"authenticated,":[30],"despite":[31],"fact":[33],"that":[34],"may":[36],"reach":[37],"unauthorized":[38],"situations.":[39],"We":[40,66],"analyse":[41],"how":[42],"dynamic":[43],"information":[44],"can":[45],"be":[46],"used":[47],"improve":[49],"security":[50],"in":[51,56,80],"authorization":[53,76],"process,":[54],"especially":[55],"case":[58],"asynchronous":[60],"communications,":[61],"messaging":[63],"or":[64,87],"eventing.":[65],"experiment":[67],"validate":[69],"our":[70],"approach":[71],"using":[72],"context":[73],"as":[74],"an":[75],"factor":[77],"for":[78,83],"eventing":[79],"Web":[81],"service":[82],"device":[84],"(like":[85],"UPnP":[86],"DPWS).":[88]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
