{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:53:34Z","timestamp":1775145214057,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030242701","type":"print"},{"value":"9783030242718","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_46","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"517-529","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7086-3333","authenticated-orcid":false,"given":"Ke","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7740-2401","authenticated-orcid":false,"given":"Geng","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"2","key":"46_CR1","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/69.991718","volume":"14","author":"NR Adam","year":"2002","unstructured":"Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: A content-based authorization model for digital libraries. IEEE Trans. Knowl. Data Eng. 14(2), 296\u2013315 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Aluvalu, R.K., Muddana, L.: A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing. In: IEEE International Conference on Computational Intelligence and Computing Research, pp. 1\u20135 (2016)","DOI":"10.1109\/ICCIC.2016.7919618"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Jadliwala, M., Maiti, A., Namboodiri, V.: Social puzzles: context-based access control in online social networks. In: IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 299\u2013310 (2014)","DOI":"10.1109\/DSN.2014.38"},{"issue":"4","key":"46_CR4","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TIFS.2017.2771492","volume":"13","author":"S Jha","year":"2018","unstructured":"Jha, S., Sural, S., Atluri, V., Vaidya, J.: Specification and verification of separation of duty constraints in attribute based access control. IEEE Trans. Inf. Forensics Secur. 13(4), 897\u2013911 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Li, T., Rui, Y.: Priexpress: privacy-preserving express delivery with fine-grained attribute-based access control. In: Communications and Network Security, pp. 333\u2013341 (2017)","DOI":"10.1109\/CNS.2016.7860501"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Liu, Z., Jiang, Z.L., Wang, X., Yiu, S.M., Zhang, C., Zhao, X.: Dynamic attribute-based access control in cloud storage systems. In: Trustcom\/BigDataSE\/ISPA, pp. 129\u2013137 (2017)","DOI":"10.1109\/TrustCom.2016.0055"},{"key":"46_CR7","first-page":"19","volume":"12","author":"X Luo","year":"2016","unstructured":"Luo, X., Wang, W., Luo, W.: The retrospect and prospect of access control technology. Netinfo Secur. 12, 19\u201327 (2016)","journal-title":"Netinfo Secur."},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Mannes, E., Maziero, C., Lassance, L., Borges, F.: Optimized access control enforcement over encrypted content in information-centric networks. In: Computers and Communication, pp. 924\u2013929 (2015)","DOI":"10.1109\/ISCC.2015.7405632"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Nagai, S., Kaida, T., Mizuno, O.: The group data access control method in content centric network, pp. 1\u20133 (2015)","DOI":"10.1109\/APSITT.2015.7217101"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Paradesi, S., Liccardi, I., Kagal, L., Pato, J.: A semantic framework for content-based access controls. In: International Conference on Social Computing, pp. 624\u2013629 (2013)","DOI":"10.1109\/SocialCom.2013.94"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Qi, H., Luo, X., Di, X., Li, J., Yang, H., Jiang, Z.: Access control model based on role and attribute and its implementation. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 66\u201371 (2017)","DOI":"10.1109\/CyberC.2016.21"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Rubart, J.: Context-based access control. In: Symposia on Metainformatics, p. 13 (2005)","DOI":"10.1145\/1234324.1234337"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Ulusoy, H., Colombo, P., Ferrari, E., Kantarcioglu, M., Pattuk, E.: GuardMR: fine-grained security policy enforcement for MapReduce systems. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 285\u2013296. ACM (2015)","DOI":"10.1145\/2714576.2714624"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Ulusoy, H., Kantarcioglu, M., Pattuk, E., Hamlen, K.: Vigiles: fine-grained access control for MapReduce systems. In: 2014 IEEE International Congress on Big Data (BigData Congress), pp. 40\u201347. IEEE (2014)","DOI":"10.1109\/BigData.Congress.2014.16"},{"issue":"3","key":"46_CR15","first-page":"465","volume":"55","author":"M Wang","year":"2018","unstructured":"Wang, M., Wang, J., Guo, L., Harn, L.: Inverted XML access control model based on ontology semantic dependency. CMC: Comput. Mater. Continua 55(3), 465\u2013482 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"46_CR16","unstructured":"Wu, M.Y., Chen, Y.W., Ke, C.K.: Design and implementation of a context and role-based access control model for digital content. In: IET International Conference on Frontier Computing, Theory, Technologies and Applications, pp. 253\u2013257 (2010)"},{"key":"46_CR17","unstructured":"Wu, M.Y., Zhuo, Z.X.: Digital content access control for end-users. In: International Conference on Software Intelligence Technologies and Applications and International Conference on Frontiers of Internet of Things, pp. 39\u201342 (2014)"},{"key":"46_CR18","doi-asserted-by":"crossref","unstructured":"Zeng, W., Yang, Y., Luo, B.: Content-based access control: use data content to assist access control for large-scale content-centric databases. In: IEEE International Conference on Big Data, pp. 701\u2013710 (2014)","DOI":"10.1109\/BigData.2014.7004294"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T04:09:30Z","timestamp":1610510970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}