{"id":"https://openalex.org/W2533155036","doi":"https://doi.org/10.1155/2016/8743504","title":"On the Modelling of Context-Aware Security for Mobile Devices","display_name":"On the Modelling of Context-Aware Security for Mobile Devices","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2533155036","doi":"https://doi.org/10.1155/2016/8743504","mag":"2533155036"},"language":"en","primary_location":{"id":"doi:10.1155/2016/8743504","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2016/8743504","pdf_url":"http://downloads.hindawi.com/journals/misy/2016/8743504.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/misy/2016/8743504.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030656985","display_name":"Tomasz \u017burek","orcid":"https://orcid.org/0000-0002-9129-3157"},"institutions":[{"id":"https://openalex.org/I174183983","display_name":"Maria Curie-Sk\u0142odowska University","ror":"https://ror.org/015h0qg34","country_code":"PL","type":"education","lineage":["https://openalex.org/I174183983"]},{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Tomasz Zurek","raw_affiliation_strings":["Institute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, Poland","institution_ids":["https://openalex.org/I174183983","https://openalex.org/I4210087266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088325865","display_name":"Michail Mokkas","orcid":"https://orcid.org/0000-0002-3819-1530"},"institutions":[{"id":"https://openalex.org/I3017851245","display_name":"Polish-Japanese Academy of Information Technology","ror":"https://ror.org/01v542j61","country_code":"PL","type":"education","lineage":["https://openalex.org/I3017851245"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Michail Mokkas","raw_affiliation_strings":["Polish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Polish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, Poland","institution_ids":["https://openalex.org/I3017851245"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026662040","display_name":"Bogdan Ksi\u0119\u017copolski","orcid":"https://orcid.org/0000-0003-1904-3222"},"institutions":[{"id":"https://openalex.org/I174183983","display_name":"Maria Curie-Sk\u0142odowska University","ror":"https://ror.org/015h0qg34","country_code":"PL","type":"education","lineage":["https://openalex.org/I174183983"]},{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Bogdan Ksiezopolski","raw_affiliation_strings":["Institute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, Poland","institution_ids":["https://openalex.org/I174183983","https://openalex.org/I4210087266"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026662040"],"corresponding_institution_ids":["https://openalex.org/I174183983","https://openalex.org/I4210087266"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.167,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.57722322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2016","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.911471962928772},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.7074978351593018},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6061556339263916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5334891080856323},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5287308692932129},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.49859070777893066},{"id":"https://openalex.org/keywords/context-management","display_name":"Context management","score":0.43974217772483826},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4170442521572113},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.36310768127441406},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.304030179977417},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2893064022064209},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09399035573005676}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.911471962928772},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.7074978351593018},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6061556339263916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5334891080856323},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5287308692932129},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.49859070777893066},{"id":"https://openalex.org/C2776285913","wikidata":"https://www.wikidata.org/wiki/Q5165183","display_name":"Context management","level":3,"score":0.43974217772483826},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4170442521572113},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.36310768127441406},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.304030179977417},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2893064022064209},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09399035573005676},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2016/8743504","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2016/8743504","pdf_url":"http://downloads.hindawi.com/journals/misy/2016/8743504.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2dd608ef3ee144209ffd6e6556a60832","is_oa":true,"landing_page_url":"https://doaj.org/article/2dd608ef3ee144209ffd6e6556a60832","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mobile Information Systems, Vol 2016 (2016)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2016/8743504","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2016/8743504","pdf_url":"http://downloads.hindawi.com/journals/misy/2016/8743504.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[{"id":"https://openalex.org/G649451834","display_name":null,"funder_award_id":"2012/05/B/ST6/03364","funder_id":"https://openalex.org/F4320322511","funder_display_name":"Narodowe Centrum Nauki"}],"funders":[{"id":"https://openalex.org/F4320322511","display_name":"Narodowe Centrum Nauki","ror":"https://ror.org/03ha2q922"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2533155036.pdf","grobid_xml":"https://content.openalex.org/works/W2533155036.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W16013415","https://openalex.org/W167308890","https://openalex.org/W231180639","https://openalex.org/W1974189917","https://openalex.org/W1995156798","https://openalex.org/W2010489268","https://openalex.org/W2015507911","https://openalex.org/W2024102269","https://openalex.org/W2042808087","https://openalex.org/W2062527204","https://openalex.org/W2068849277","https://openalex.org/W2081169051","https://openalex.org/W2085774618","https://openalex.org/W2088166168","https://openalex.org/W2107532769","https://openalex.org/W2108398378","https://openalex.org/W2121168205","https://openalex.org/W2132010475"],"related_works":["https://openalex.org/W2059592812","https://openalex.org/W2392958972","https://openalex.org/W1546641819","https://openalex.org/W4232025056","https://openalex.org/W2100046962","https://openalex.org/W2153812024","https://openalex.org/W1536683664","https://openalex.org/W2436001314","https://openalex.org/W57335507","https://openalex.org/W74882869"],"abstract_inverted_index":{"Security":[0],"management":[1,168],"in":[2,94,150],"wireless":[3],"networks":[4],"has":[5],"to":[6,19,38,48,63],"deal":[7],"with":[8,152],"the":[9,13,32,56,67,74,95,113,115,118,124,157,162],"changing":[10],"character":[11],"of":[12,30,55,112,117,121,128,146,165],"environment,":[14],"which":[15,59,83],"can":[16,51],"further":[17],"lead":[18],"decision":[20],"making":[21],"problem":[22],"for":[23,43,169],"unexpected":[24],"events.":[25],"Among":[26],"a":[27,61,78,109,142],"huge":[28],"list":[29],"devices,":[31],"mobile":[33,170],"ones":[34,107],"are":[35,108],"especially":[36],"vulnerable":[37],"this":[39],"situation.":[40],"The":[41,98],"solution":[42],"adapting":[44],"systems":[45],"and":[46,89,126,132],"applications":[47],"dynamic":[49],"environments":[50],"be":[52],"context-aware":[53,79,166],"description":[54],"user":[57],"actions,":[58],"gives":[60],"possibility":[62],"take":[64],"into":[65,141],"account":[66],"factors":[68],"that":[69,92,101],"influence":[70],"these":[71,138],"actions.":[72],"In":[73],"article,":[75],"we":[76,160],"propose":[77],"security":[80,148,167],"adjusting":[81,147],"model,":[82,114],"is":[84],"based":[85],"on":[86],"proposition":[87],"logic":[88],"incorporates":[90],"mechanisms":[91],"assist":[93],"reasoning":[96],"process.":[97],"main":[99],"benefits":[100],"differentiate":[102],"our":[103],"approach":[104],"from":[105],"similar":[106],"formal":[110],"representation":[111],"usage":[116],"whole":[119],"spectrum":[120],"context":[122],"attributes,":[123],"detection":[125],"analysis":[127],"contextual":[129],"data":[130],"integrity,":[131],"conflicting":[133],"rules\u2019":[134],"eradication":[135],"capability.":[136],"All":[137],"traits":[139],"transcribe":[140],"more":[143],"effective":[144],"way":[145],"measures":[149],"accordance":[151],"existing":[153],"circumstances.":[154],"To":[155],"illustrate":[156],"proposed":[158],"approach,":[159],"present":[161],"case":[163],"study":[164],"devices.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
