{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:34:11Z","timestamp":1765546451580,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030150310"},{"type":"electronic","value":"9783030150327"}],"license":[{"start":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:00:00Z","timestamp":1552608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-15032-7_97","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T08:30:46Z","timestamp":1552552246000},"page":"1157-1168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things"],"prefix":"10.1007","author":[{"given":"Hamdi","family":"Ouechtati","sequence":"first","affiliation":[]},{"given":"Nadia Ben","family":"Azzouna","sequence":"additional","affiliation":[]},{"given":"Lamjed Ben","family":"Said","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"issue":"3","key":"97_CR1","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/JSAC.2016.2525418","volume":"34","author":"MR Palattella","year":"2016","unstructured":"Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T., Ladid, L.: Internet of things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 34(3), 510\u2013527 (2016)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"12","key":"97_CR2","first-page":"3619","volume":"5","author":"GA Akpakwu","year":"2017","unstructured":"Akpakwu, G.A., Silva, B.J., Hancke, G.P., Abu-Mahfouz, A.M.: A survey on 5G networks for the internet of things: communication technologies and challenges. IEEE Access 5(12), 3619\u20133647 (2017)","journal-title":"IEEE Access"},{"key":"97_CR3","doi-asserted-by":"crossref","unstructured":"Ouechtati, H., Azzouna, N.B.: Trust-ABAC towards an access control system for the internet of things. In: International Conference on Green, Pervasive, and Cloud Computing, pp. 75\u201389. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-57186-7_7"},{"issue":"4","key":"97_CR4","first-page":"805","volume":"40","author":"F-H Li","year":"2012","unstructured":"Li, F.-H., Su, M., Shi, G.-Z., et al.: Research status and development trends of access control model. Dianzi Xuebao (Acta Electronica Sinica) 40(4), 805\u2013813 (2012)","journal-title":"Dianzi Xuebao (Acta Electronica Sinica)"},{"key":"97_CR5","doi-asserted-by":"crossref","unstructured":"Blackstock, M., Lea, R.: IoT interoperability: a hub-based approach. In: 2014 International Conference on the Internet of Things (IOT), pp. 79\u201384. IEEE (2014)","DOI":"10.1109\/IOT.2014.7030119"},{"key":"97_CR6","doi-asserted-by":"crossref","unstructured":"Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, vol. 8, pp. 18\u201324 (1974)","DOI":"10.1145\/775265.775268"},{"key":"97_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"RS Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26, 9\u201319 (1993)","journal-title":"IEEE Comput."},{"key":"97_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29, 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"97_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1210263.1210265","volume":"10","author":"ML Damiani","year":"2006","unstructured":"Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10, 1\u201334 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"97_CR10","doi-asserted-by":"crossref","unstructured":"Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: The 10th IEEE International Conference on High Performance Computing and Communications, pp. 629\u2013634 (2008)","DOI":"10.1109\/HPCC.2008.37"},{"key":"97_CR11","doi-asserted-by":"crossref","unstructured":"Dan, N., Hua-Ji, S., Yuan, C., Jia-Hu, G.: Attribute based access control (ABAC)-based cross-domain access control in service-oriented architecture (SOA). In: Proceedings of the International Conference on Computer Science and Service System (CSSS 2012) (2012)","DOI":"10.1109\/CSSS.2012.354"},{"issue":"5","key":"97_CR12","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","volume":"26","author":"M Nitti","year":"2014","unstructured":"Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 26(5), 1253\u20131266 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"97_CR13","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"97_CR14","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.cose.2013.09.001","volume":"39","author":"YB Saied","year":"2013","unstructured":"Saied, Y.B., Olivereau, A., Zeghlache, D., et al.: Trust management system design for the internet of things: a context-aware and multi-service approach. Comput. Secur. 39, 351\u2013365 (2013)","journal-title":"Comput. Secur."},{"key":"97_CR15","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.future.2013.05.010","volume":"31","author":"WW Smari","year":"2014","unstructured":"Smari, W.W., Clemente, P., Lalande, J.-F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future Gener. Comput. Syst. 31, 147\u2013168 (2014)","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"97_CR16","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1016\/j.compeleceng.2012.06.002","volume":"38","author":"D Chen","year":"2012","unstructured":"Chen, D., Chang, G., Sun, D., et al.: Modeling access control for cyber-physical systems using reputation. Comput. Electric. Eng. 38(5), 1088\u20131101 (2012)","journal-title":"Comput. Electric. Eng."},{"key":"97_CR17","doi-asserted-by":"crossref","unstructured":"Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in internet of things. In: 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems (VITAE), pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/VITAE.2013.6617083"},{"key":"97_CR18","doi-asserted-by":"crossref","unstructured":"Armando, A., Bezzi, M., Di Cerbo, F., et al.: Balancing trust and risk in access control. In: OTM Confederated International Conferences on the Move to Meaningful Internet Systems, pp. 660\u2013676. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-26148-5_45"},{"issue":"9","key":"97_CR19","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1002\/dac.2417","volume":"25","author":"F Xia","year":"2012","unstructured":"Xia, F., Yang, L.T., Wang, L., et al.: Internet of things. Int. J. Commun. Syst. 25(9), 1101\u20131102 (2012)","journal-title":"Int. J. Commun. Syst."},{"key":"97_CR20","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In: International Workshop on Peer To Peer Systems. Springer, Berlin, Heidelberg (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"97_CR21","doi-asserted-by":"crossref","unstructured":"Bhuiyan, M.Z.A., Wu, J.: Collusion attack detection in networked systems. In: Proceedings of the 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (IEEE DASC 2016), p. 18 (2016)","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.67"},{"issue":"16","key":"97_CR22","doi-asserted-by":"publisher","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","volume":"56","author":"L Atzori","year":"2012","unstructured":"Atzori, L., Iera, A., Morabito, G., et al.: The social internet of things (SIoT) when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594\u20133608 (2012)","journal-title":"Comput. Netw."},{"issue":"7","key":"97_CR23","doi-asserted-by":"publisher","first-page":"745","DOI":"10.4304\/jsw.5.7.745-752","volume":"5","author":"S Gong","year":"2010","unstructured":"Gong, S.: A collaborative filtering recommendation algorithm based on user clustering and item clustering. JSW 5(7), 745\u2013752 (2010)","journal-title":"JSW"},{"issue":"4","key":"97_CR24","first-page":"583","volume":"17","author":"MC Pham","year":"2011","unstructured":"Pham, M.C., Cao, Y., Klamma, R., et al.: A clustering approach for collaborative filtering recommendation using social network analysis. J. UCS 17(4), 583\u2013604 (2011)","journal-title":"J. UCS"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15032-7_97","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:38:44Z","timestamp":1558147124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15032-7_97"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,15]]},"ISBN":["9783030150310","9783030150327"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15032-7_97","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,15]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}