{"id":"https://openalex.org/W2101541078","doi":"https://doi.org/10.1109/icdim.2008.4746774","title":"A Quality-Aware Context-Based Access Control model for ubiquitous applications","display_name":"A Quality-Aware Context-Based Access Control model for ubiquitous applications","publication_year":2008,"publication_date":"2008-11-01","ids":{"openalex":"https://openalex.org/W2101541078","doi":"https://doi.org/10.1109/icdim.2008.4746774","mag":"2101541078"},"language":"en","primary_location":{"id":"doi:10.1109/icdim.2008.4746774","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2008.4746774","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Digital Information Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088872135","display_name":"Jos\u00e9 Bringel Filho","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104430","display_name":"Laboratoire d'Informatique de Grenoble","ror":"https://ror.org/01c8rcg82","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210104430","https://openalex.org/I4210159245","https://openalex.org/I899635006","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Jose Bringel Filho","raw_affiliation_strings":["LIG laboratory, Grenoble University, Saint Martin d'Heres, France","LIG Lab., Grenoble Univ., St. Martin d'Heres"],"affiliations":[{"raw_affiliation_string":"LIG laboratory, Grenoble University, Saint Martin d'Heres, France","institution_ids":["https://openalex.org/I899635006","https://openalex.org/I4210104430"]},{"raw_affiliation_string":"LIG Lab., Grenoble Univ., St. Martin d'Heres","institution_ids":["https://openalex.org/I899635006","https://openalex.org/I4210104430"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058183006","display_name":"Herv\u00e9 Martin","orcid":"https://orcid.org/0000-0002-6365-4760"},"institutions":[{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]},{"id":"https://openalex.org/I4210104430","display_name":"Laboratoire d'Informatique de Grenoble","ror":"https://ror.org/01c8rcg82","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210104430","https://openalex.org/I4210159245","https://openalex.org/I899635006","https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Herve Martin","raw_affiliation_strings":["LIG laboratory, Grenoble University, Saint Martin d'Heres, France","LIG Lab., Grenoble Univ., St. Martin d'Heres"],"affiliations":[{"raw_affiliation_string":"LIG laboratory, Grenoble University, Saint Martin d'Heres, France","institution_ids":["https://openalex.org/I899635006","https://openalex.org/I4210104430"]},{"raw_affiliation_string":"LIG Lab., Grenoble Univ., St. Martin d'Heres","institution_ids":["https://openalex.org/I899635006","https://openalex.org/I4210104430"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088872135"],"corresponding_institution_ids":["https://openalex.org/I4210104430","https://openalex.org/I899635006"],"apc_list":null,"apc_paid":null,"fwci":1.0365,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.86842909,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.8489953279495239},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8099918365478516},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7944375872612},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.7653212547302246},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.6807399392127991},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.610529899597168},{"id":"https://openalex.org/keywords/context-awareness","display_name":"Context awareness","score":0.576797366142273},{"id":"https://openalex.org/keywords/context-model","display_name":"Context model","score":0.5659222602844238},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.4572768211364746},{"id":"https://openalex.org/keywords/context-management","display_name":"Context management","score":0.420733243227005},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.39168745279312134},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3698859214782715},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.280400812625885},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11407634615898132}],"concepts":[{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.8489953279495239},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8099918365478516},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7944375872612},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.7653212547302246},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.6807399392127991},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.610529899597168},{"id":"https://openalex.org/C2781368080","wikidata":"https://www.wikidata.org/wiki/Q501688","display_name":"Context awareness","level":3,"score":0.576797366142273},{"id":"https://openalex.org/C183322885","wikidata":"https://www.wikidata.org/wiki/Q17007702","display_name":"Context model","level":3,"score":0.5659222602844238},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.4572768211364746},{"id":"https://openalex.org/C2776285913","wikidata":"https://www.wikidata.org/wiki/Q5165183","display_name":"Context management","level":3,"score":0.420733243227005},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.39168745279312134},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3698859214782715},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.280400812625885},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11407634615898132},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdim.2008.4746774","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2008.4746774","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Digital Information Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W49283320","https://openalex.org/W1526290698","https://openalex.org/W1553052391","https://openalex.org/W1565508863","https://openalex.org/W1829602563","https://openalex.org/W1890284543","https://openalex.org/W1967661515","https://openalex.org/W2076004681","https://openalex.org/W2076157794","https://openalex.org/W2109368777","https://openalex.org/W2111699416","https://openalex.org/W2116479484","https://openalex.org/W2129533252","https://openalex.org/W2140101462","https://openalex.org/W2160381306","https://openalex.org/W2166602595","https://openalex.org/W2168535830","https://openalex.org/W2169549719","https://openalex.org/W2522844336","https://openalex.org/W3143489862","https://openalex.org/W6602009137","https://openalex.org/W6631429308","https://openalex.org/W6633126241","https://openalex.org/W6676719586","https://openalex.org/W6727566201","https://openalex.org/W7064801541"],"related_works":["https://openalex.org/W2059592812","https://openalex.org/W4232025056","https://openalex.org/W2392958972","https://openalex.org/W2153812024","https://openalex.org/W2100046962","https://openalex.org/W57335507","https://openalex.org/W2102543574","https://openalex.org/W2436001314","https://openalex.org/W1656433004","https://openalex.org/W2116169104"],"abstract_inverted_index":{"With":[0],"the":[1,43,62],"growing":[2],"advancement":[3],"of":[4],"ubiquitous":[5],"computing":[6],"(UbiComp),":[7],"we":[8,50],"are":[9],"moving":[10],"towards":[11],"an":[12],"era":[13],"where":[14],"access":[15,44,55,74],"control":[16,45,56],"and":[17,65,71],"security":[18],"policies":[19],"will":[20],"be":[21],"based":[22],"on":[23],"context":[24,27,63],"information.":[25],"As":[26],"information":[28,64],"represents":[29],"real-world":[30],"situations,":[31],"it":[32],"is":[33],"associated":[34],"with":[35],"certain":[36],"quality":[37],"indicators":[38,68],"that":[39,58],"can":[40],"directly":[41],"influence":[42],"decisions.":[46],"In":[47],"this":[48],"paper,":[49],"propose":[51],"a":[52],"quality-aware":[53],"context-based":[54],"model":[57],"takes":[59],"into":[60],"account":[61],"its":[66],"QoC":[67],"to":[69,72,76],"grant":[70],"adapt":[73],"permissions":[75],"resources.":[77]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
