{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:51:05Z","timestamp":1767919865199,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3543792","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-10","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness"],"prefix":"10.1145","author":[{"given":"Tahir","family":"Ahmad","sequence":"first","affiliation":[{"name":"Center for Cybersecurity, Fondazione Bruno Kessler (FBK), Italy"}]},{"given":"Umberto","family":"Morelli","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity, Fondazione Bruno Kessler (FBK), Italy"}]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity, Fondazione Bruno Kessler (FBK), Italy and Department of Mathematics, University of Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395617"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205989"},{"key":"e_1_3_2_1_3_1","volume-title":"International Journal of Information Security","author":"Ahmad Tahir","year":"2021","unstructured":"Tahir Ahmad, Umberto Morelli, Silvio Ranise, and Nicola Zannone. 2021. Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. International Journal of Information Security (2021), 1\u201330."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2017.8171378"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.018"},{"key":"e_1_3_2_1_6_1","volume-title":"Eventual Consistency Today: Limitations, Extensions, and Beyond: How can applications be built on eventually consistent infrastructure given no guarantee of safety?Queue 11, 3","author":"Bailis Peter","year":"2013","unstructured":"Peter Bailis and Ali Ghodsi. 2013. Eventual Consistency Today: Limitations, Extensions, and Beyond: How can applications be built on eventually consistent infrastructure given no guarantee of safety?Queue 11, 3 (2013), 20\u201332."},{"key":"e_1_3_2_1_7_1","volume-title":"Ken Borgendale, and Rahul Gupta.","author":"Banks Andrew","year":"2019","unstructured":"Andrew Banks, Ed Briggs, Ken Borgendale, and Rahul Gupta. 2019. MQTT Version 5.0. Technical Report. OASIS. https:\/\/linproxy.fan.workers.dev:443\/https\/docs.oasis-open.org\/mqtt\/mqtt\/v5.0\/mqtt-v5.0.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Andrew Banks and Rahul Gupta. 2015. MQTT Version 3.1.1 Plus Errata 01. Technical Report. OASIS. https:\/\/linproxy.fan.workers.dev:443\/https\/docs.oasis-open.org\/mqtt\/mqtt\/v3.1.1\/mqtt-v3.1.1.html"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395618"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2931686"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983282"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875496"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180457.3180460"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.08.001"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205994"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943528"},{"key":"e_1_3_2_1_19_1","unstructured":"Leslie Lamport. 2019. Time clocks and the ordering of events in a distributed system. In Concurrency: the Works of Leslie Lamport. 179\u2013196."},{"key":"e_1_3_2_1_20_1","volume-title":"Intrusion Detection and Prevention for Mobile Ecosystems","author":"Marinos Louis","unstructured":"Louis Marinos. 2017. Security Concerns in Cooperative Intelligent Transportation Systems. In Intrusion Detection and Prevention for Mobile Ecosystems. CRC Press, 487\u2013522."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"DL Mills. 1985. RFC0958: Network Time Protocol (NTP).","DOI":"10.17487\/rfc0958"},{"key":"e_1_3_2_1_22_1","volume-title":"International Workshop on Emerging Technologies for Authorization and Authentication. Springer, 16\u201334","author":"Ravidas Sowmya","year":"2019","unstructured":"Sowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, and Nicola Zannone. 2019. An authorization framework for cooperative intelligent transport systems. In International Workshop on Emerging Technologies for Authorization and Authentication. Springer, 16\u201334."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.017"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/1463922X.2010.539289"},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Critical Information Infrastructures Security. Springer, 15\u201326","author":"Salonikias Stavros","year":"2015","unstructured":"Stavros Salonikias, Ioannis Mavridis, and Dimitris Gritzalis. 2015. Access control issues in utilizing fog computing for transport infrastructure. In International Conference on Critical Information Infrastructures Security. Springer, 15\u201326."},{"key":"e_1_3_2_1_26_1","volume-title":"International School on Foundations of Security Analysis and Design","author":"Samarati Pierangela","unstructured":"Pierangela Samarati and Sabrina\u00a0Capitani de Vimercati. 2000. Access control: Policies, models, and mechanisms. In International School on Foundations of Security Analysis and Design. Springer, 137\u2013196."}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2022"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3538969.3543792","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3543792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:57Z","timestamp":1750186797000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3538969.3543792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":26,"alternative-id":["10.1145\/3538969.3543792","10.1145\/3538969"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3538969.3543792","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}