{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T11:12:41Z","timestamp":1775301161407,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030053444","type":"print"},{"value":"9783030053451","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_31","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"361-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Privacy-Preserving Attribute-Based Access Control Scheme"],"prefix":"10.1007","author":[{"given":"Yang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Quanrun","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ju","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"1","key":"31_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","volume":"29","author":"N Fernando","year":"2013","unstructured":"Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29(1), 84\u2013106 (2013)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"31_CR2","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","volume":"19","author":"Y Mao","year":"2017","unstructured":"Mao, Y., You, C., Zhang, J., Huang, K., Letaief, K.B.: A survey on mobile edge computing: the communication perspective. IEEE Commun. Surv. Tutor. 19(4), 2322\u20132358 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"31_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MCSE.2017.17","volume":"19","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Guo, K., Ren, J., Wang, J., Chen, J.: Transparent computing: a promising network computing paradigm. Comput. Sci. Eng. 19(1), 7\u201320 (2017)","journal-title":"Comput. Sci. Eng."},{"key":"31_CR4","unstructured":"Lindqvist, H.: Mandatory access control. Master\u2019s thesis, Umea University, Sweden (2006)"},{"key":"31_CR5","unstructured":"Li, N.: Discretionary access control. In: IEEE Symposium on Security & Privacy, vol. 13, pp. 96\u2013109. IEEE (2011)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: towards a unified standard. In: ACM Workshop on Role-Based Access Control, pp. 47\u201363. ACM (2000)","DOI":"10.1145\/344287.344301"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Hu, C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Scarfone, K.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Special Publication (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"issue":"4","key":"31_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/3007204","volume":"49","author":"D Servos","year":"2017","unstructured":"Servos, D., Osborn, S.: Current research and open problems in attribute-based access control. ACM Comput. Surv. 49(4), 65\u2013107 (2017)","journal-title":"ACM Comput. Surv."},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Ni, D., Shi, H., Chen, Y., Guo, J.: Attribute based access control (ABAC)-based cross-domain access control in service-oriented architecture (SOA). In: IEEE International Conference on Computer Science & Service System (CSSS 2012), pp. 1405\u20131408. IEEE (2012)","DOI":"10.1109\/CSSS.2012.354"},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-319-72389-1_27","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"Y Xu","year":"2017","unstructured":"Xu, Y., Gao, W., Zeng, Q., Wang, G., Ren, J., Zhang, Y.: FABAC: a flexible fuzzy attribute-based access control mechanism. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 332\u2013343. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_27"},{"key":"31_CR11","first-page":"1","volume":"2018","author":"Y Xu","year":"2018","unstructured":"Xu, Y., Gao, W., Zeng, Q., Wang, G., Ren, J., Zhang, Y.: A feasible fuzzy-extended attribute-based access control technique. Secur. Commun. Netw. 2018, 1\u201311 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"31_CR12","unstructured":"Jin, X.: Attribute-based access control models and implementation in cloud infrastructure as a service. Doctoral thesis. The University of Texas at San. Antonio, USA (2014)"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.future.2016.01.006","volume":"80","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. 80, 421\u2013429 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Gupta, M., Patwa, F., Sandhu, R.: An Attribute-based access control model for secure big data processing in Hadoop ecosystem. In: ACM Workshop, pp. 13\u201324. ACM (2018)","DOI":"10.1145\/3180457.3180463"},{"key":"31_CR15","unstructured":"Cavoukian, A., Chibba, M., Williamson, G., Ferguson, A.: The importance of ABAC: attribute-based access control to big data: privacy and context. Research report. Ryerson University, Canada (2015)"},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-56877-5_8","volume-title":"Interoperability and Open-Source Solutions for the Internet of Things","author":"S Sciancalepore","year":"2017","unstructured":"Sciancalepore, S., et al.: Attribute-based access control scheme in federated IoT platforms. In: Podnar \u017darko, I., Broering, A., Soursos, S., Serrano, M. (eds.) InterOSS-IoT 2016. LNCS, vol. 10218, pp. 123\u2013138. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56877-5_8"},{"key":"31_CR17","unstructured":"Monir, S.: A lightweight attribute-based access control system for IoT. Master\u2019s thesis. University of Saskatchewan, Saskatoon (2017)"},{"key":"31_CR18","unstructured":"Axiomatics. https:\/\/www.axiomatics.com . Accessed 5 Sept 2018"},{"key":"31_CR19","unstructured":"NextLabs. https:\/\/www.nextlabs.com . Accessed 17 June 2018"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Irwin, K., Yu, T.: Preventing attribute information leakage in automated trust negotiation. In: 12th ACM Conference on Computer and Communications Security, pp. 36\u201345. ACM (2005)","DOI":"10.1145\/1102120.1102128"},{"key":"31_CR21","unstructured":"Wu, K., Gao, H.: Attribute-based access control for web service with requester\u2019s attribute privacy protected. In: International Conference on Informational Technology and Environmental, pp. 932\u2013936 (2008)"},{"issue":"4","key":"31_CR22","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1504\/IJGUC.2014.065372","volume":"5","author":"P Sang","year":"2014","unstructured":"Sang, P., Chung, S.: Privacy-preserving attribute-based access control for grid computing. Int. J. Grid Util. Comput. 5(4), 286\u2013296 (2014)","journal-title":"Int. J. Grid Util. Comput."},{"key":"31_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-642-37804-1_30","volume-title":"Service-Oriented Computing - ICSOC 2012 Workshops","author":"G Zhang","year":"2013","unstructured":"Zhang, G., Liu, J., Liu, J.: Protecting sensitive attributes in attribute based access control. In: Ghose, A., et al. (eds.) ICSOC 2012. LNCS, vol. 7759, pp. 294\u2013305. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37804-1_30"},{"key":"31_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-642-13067-0_59","volume-title":"Advances in Grid and Pervasive Computing","author":"A Esmaeeli","year":"2010","unstructured":"Esmaeeli, A., Shahriari, H.R.: Privacy protection of grid service requesters through distributed attribute based access control model. In: Bellavista, P., Chang, R.-S., Chao, H.-C., Lin, S.-F., Sloot, P.M.A. (eds.) GPC 2010. LNCS, vol. 6104, pp. 573\u2013582. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13067-0_59"},{"key":"31_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-73538-0_11","volume-title":"Data and Applications Security XXI","author":"J Kolter","year":"2007","unstructured":"Kolter, J., Schillinger, R., Pernul, G.: A privacy-enhanced attribute-based access control system. In: Barker, S., Ahn, G.-J. (eds.) DBSec 2007. LNCS, vol. 4602, pp. 129\u2013143. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73538-0_11"},{"key":"31_CR26","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-319-67876-4_14","volume-title":"E-Business and Telecommunications","author":"A Put","year":"2017","unstructured":"Put, A., De Decker, B.: Attribute-based privacy-friendly access control with context. In: Obaidat, M.S. (ed.) ICETE 2016. CCIS, vol. 764, pp. 291\u2013315. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67876-4_14"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Yao, A.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982), pp. 160\u2013164. IEEE (1982)","DOI":"10.1109\/SFCS.1982.38"},{"issue":"11","key":"31_CR28","first-page":"169","volume":"4","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secure Comput."},{"key":"31_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/11496137_31","volume-title":"Applied Cryptography and Network Security","author":"H-Y Lin","year":"2005","unstructured":"Lin, H.-Y., Tzeng, W.-G.: An efficient solution to the Millionaires\u2019 problem based on homomorphic encryption. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 456\u2013466. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_31"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T10:18:26Z","timestamp":1775297906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}