{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:18Z","timestamp":1740098958777,"version":"3.37.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_27","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:53:21Z","timestamp":1512554001000},"page":"332-343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism"],"prefix":"10.1007","author":[{"given":"Yang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Wuqiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Quanrun","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ju","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"issue":"18","key":"27_CR1","first-page":"587","volume":"13","author":"HT Dinh","year":"2013","unstructured":"Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 587\u20131611 (2013)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-1-4419-5906-5_798","volume-title":"Encyclopedia of Cryptography and Security","author":"N Li","year":"2011","unstructured":"Li, N.: Discretionary access control. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 353\u2013356. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_798"},{"key":"27_CR3","unstructured":"Lindqvist, H.: Mandatory access control. Master\u2019s thesis, Umea University, Sweden (2006)"},{"issue":"2","key":"27_CR4","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Hu, C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Scarfone, K.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Special Publication 800-162 (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"issue":"4","key":"27_CR6","first-page":"90","volume":"29","author":"X Li","year":"2008","unstructured":"Li, X., Feng, D., Chen, Z., Fang, Z.: Model for attribute based access control. J. Commun. 29(4), 90\u201398 (2008). (in Chinese)","journal-title":"J. Commun."},{"key":"27_CR7","unstructured":"Jin, X.: Attribute-based access control models and implementation in cloud infrastructure as a service. Ph.D. dissertation, The University of Texas at San Antonio, America (2014)"},{"key":"27_CR8","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.future.2016.08.018","volume":"72","author":"M Sookhak","year":"2017","unstructured":"Sookhak, M., Yu, F.R., Khan, M.K., Xiang, Y., Buyya, R.: Attribute-based data access control in mobile cloud computing: taxonomy and open issues. Future Gener. Comput. Syst. 72, 273\u2013287 (2017). Elsevier","journal-title":"Future Gener. Comput. Syst."},{"key":"27_CR9","first-page":"65","volume":"27","author":"C Ngo","year":"2016","unstructured":"Ngo, C., Demchenko, Y., de Laat, C.: Multi-tenant attribute-based access control for cloud infrastructure services. J. Inf. Secur. Appl. 27, 65\u201384 (2016). Elseiver","journal-title":"J. Inf. Secur. Appl."},{"key":"27_CR10","unstructured":"Axiomatics. https:\/\/www.axiomatics.com\/"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Cheng, P.C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: an experiment on quantified risk-adaptive access control. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 222\u2013230. IEEE (2007)","DOI":"10.1109\/SP.2007.21"},{"issue":"10","key":"27_CR12","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.ipl.2011.02.010","volume":"111","author":"C Mart\u00ednez-Garc\u00eda","year":"2011","unstructured":"Mart\u00ednez-Garc\u00eda, C., Navarro-Arribas, G., Borrell, J.: Fuzzy role-based access control. Inf. Process. Lett. 111(10), 483\u2013487 (2011). Elsevier","journal-title":"Inf. Process. Lett."},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Proceedings of 9th ACM Symposium on Access Control Models and Technologies, pp. 156\u2013162. ACM (2004)","DOI":"10.1145\/990036.990062"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in internet of things. In: Proceedings of 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/VITAE.2013.6617083"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: Proceedings of 10th IEEE International Conference on High Performance Computing and Communications, pp. 629\u2013634. IEEE (2008)","DOI":"10.1109\/HPCC.2008.37"},{"issue":"1","key":"27_CR16","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10619-005-1075-7","volume":"18","author":"R Bhatti","year":"2005","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distrib. Parallel Databases 18(1), 83\u2013105 (2005). Springer","journal-title":"Distrib. Parallel Databases"},{"issue":"3","key":"27_CR17","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy sets. Inf. Control 8(3), 338\u2013353 (1965). Elsevier","journal-title":"Inf. Control"},{"issue":"4","key":"27_CR18","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/3007204","volume":"49","author":"D Servos","year":"2017","unstructured":"Servos, D., Osborn, S.L.: Current research and open problems in attribute-based access control. ACM Comput. Surv. 49(4), 65\u2013107 (2017)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"27_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"EH Mamdani","year":"1975","unstructured":"Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-Mach. Stud. 7(1), 1\u201313 (1975)","journal-title":"Int. J. Man-Mach. Stud."},{"key":"27_CR20","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1017\/S0370164600025426","volume":"31","author":"A McKendrick","year":"1912","unstructured":"McKendrick, A., Pai, M.K.: XLV.\u2014the rate of multiplication of micro-organisms: a mathematical study. Roy. Soc. Edinb. 31, 649\u2013653 (1912). Cambridge","journal-title":"Roy. Soc. Edinb."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T11:27:41Z","timestamp":1570447661000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}