{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:48:54Z","timestamp":1762508934891},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"35","license":[{"start":{"date-parts":[[2023,3,5]],"date-time":"2023-03-05T00:00:00Z","timestamp":1677974400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,5]],"date-time":"2023-03-05T00:00:00Z","timestamp":1677974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Jiyang College of Zhejiang A&F University under Grant","award":["RC2021A03"],"award-info":[{"award-number":["RC2021A03"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s00521-023-08360-z","type":"journal-article","created":{"date-parts":[[2023,3,5]],"date-time":"2023-03-05T05:02:11Z","timestamp":1677992531000},"page":"24575-24585","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cross-domain dynamic access control based on \u201cblockchain\u2009+\u2009artificial intelligence\u201d"],"prefix":"10.1007","volume":"35","author":[{"given":"Fengling","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhenlong","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Han","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xingji","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Weigong","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,5]]},"reference":[{"issue":"1","key":"8360_CR1","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1504\/IJES.2020.105285","volume":"12","author":"J Wang","year":"2020","unstructured":"Wang J, Wang H, Zhang H (2020) A trust and attribute-based AC framework in internet of things. Int J Embedded Syst 12(1):116\u2013124","journal-title":"Int J Embedded Syst"},{"issue":"3","key":"8360_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3433542","volume":"21","author":"L Tan","year":"2021","unstructured":"Tan L (2021) A blockchain-empowered AC framework for smart devices in green internet of things. ACM Trans Inter Technol (TOIT) 21(3):1\u201320","journal-title":"ACM Trans Inter Technol (TOIT)"},{"issue":"2","key":"8360_CR3","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1007\/s10586-020-03196-x","volume":"24","author":"Saima","year":"2021","unstructured":"Saima, Mehraj, Banday MT (2021) A flexible fine-grained dynamic access control approach for cloud computing environment. Cluster Comput 24(2):1413\u20131434","journal-title":"Cluster Comput"},{"issue":"4","key":"8360_CR4","doi-asserted-by":"publisher","first-page":"4406","DOI":"10.1109\/TNSM.2021.3093002","volume":"18","author":"W Ren","year":"2021","unstructured":"Ren W (2021) SILedger: a blockchain and ABE-based AC for applications in SDN-IoT networks. IEEE Trans Netw Serv Manage 18(4):4406\u20134419","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"7","key":"8360_CR5","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s12243-019-00709-7","volume":"74","author":"E Bertin","year":"2019","unstructured":"Bertin E (2019) Access control in the IoT: a survey of existing approaches and open research questions. Ann Telecommun 74(7):375\u2013388","journal-title":"Ann Telecommun"},{"issue":"1","key":"8360_CR6","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/TVT.2018.2880238","volume":"68","author":"J-S Weng","year":"2018","unstructured":"Weng J-S (2018) BENBI: Scalable and dynamic AC on the northbound interface of SDN-based VANET. IEEE Trans Veh Technol 68(1):822\u2013831","journal-title":"IEEE Trans Veh Technol"},{"issue":"8","key":"8360_CR7","first-page":"6224","volume":"9","author":"C Feng","year":"2021","unstructured":"Feng C (2021) Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones. IEEE IoT J 9(8):6224\u20136238","journal-title":"IEEE IoT J"},{"issue":"4","key":"8360_CR8","doi-asserted-by":"publisher","first-page":"2858","DOI":"10.1109\/TII.2021.3116049","volume":"18","author":"L Wang","year":"2021","unstructured":"Wang L, Tian Y, Zhang D (2021) Toward cross-domain dynamic accumulator authentication based on blockchain in IoT. IEEE Trans Industr Inf 18(4):2858\u20132867","journal-title":"IEEE Trans Industr Inf"},{"issue":"21","key":"8360_CR9","doi-asserted-by":"publisher","first-page":"16455","DOI":"10.1007\/s00521-019-04062-7","volume":"32","author":"L Deng","year":"2020","unstructured":"Deng L (2020) A QoS optimization system for complex data cross-domain request based on neural blockchain structure. Neural Comput Appl 32(21):16455\u201316469","journal-title":"Neural Comput Appl"},{"issue":"5","key":"8360_CR10","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s12083-020-00930-5","volume":"14","author":"Na Shi","year":"2021","unstructured":"Shi Na (2021) BacS: a blockchain-based AC scheme in distributed internet of things. Peer-to-peer Netw Appl 14(5):2585\u20132599","journal-title":"Peer-to-peer Netw Appl"},{"issue":"1","key":"8360_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.23919\/JCIN.2021.9387704","volume":"6","author":"R Chen","year":"2021","unstructured":"Chen R (2021) Bidm: a blockchain-enabled cross-domain identity management system. J Commun Inf Netw 6(1):44\u201358","journal-title":"J Commun Inf Netw"},{"issue":"4","key":"8360_CR12","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.1109\/COMST.2020.3023963","volume":"22","author":"Q Zhou","year":"2020","unstructured":"Zhou Q (2020) Distributed control and communication strategies in networked microgrids. IEEE Commun Surv Tutor 22(4):2586\u20132633","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"8360_CR13","doi-asserted-by":"publisher","first-page":"2429","DOI":"10.1109\/COMST.2018.2815638","volume":"20","author":"I Afolabi","year":"2018","unstructured":"Afolabi I (2018) Network slicing and softwarization: a survey on principles, enabling technologies, and solutions. IEEE Commun Surv Tutor 20(3):2429\u20132453","journal-title":"IEEE Commun Surv Tutor"},{"issue":"14","key":"8360_CR14","doi-asserted-by":"publisher","first-page":"11475","DOI":"10.1007\/s00521-020-05519-w","volume":"34","author":"I Yaqoob","year":"2022","unstructured":"Yaqoob I (2022) Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput Appl 34(14):11475\u201311490","journal-title":"Neural Comput Appl"},{"issue":"2","key":"8360_CR15","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","volume":"6","author":"PJ Taylor","year":"2020","unstructured":"Taylor PJ (2020) A systematic literature review of blockchain cyber security. Digital Commun Netw 6(2):147\u2013156","journal-title":"Digital Commun Netw"},{"issue":"4","key":"8360_CR16","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.clsr.2019.04.006","volume":"35","author":"R Clarke","year":"2019","unstructured":"Clarke R (2019) Why the world wants controls over artificial intelligence. Comput Law Secur Rev 35(4):423\u2013433","journal-title":"Comput Law Secur Rev"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08360-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08360-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08360-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T12:05:15Z","timestamp":1700136315000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08360-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,5]]},"references-count":16,"journal-issue":{"issue":"35","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["8360"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08360-z","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,5]]},"assertion":[{"value":"21 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}