{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:59:20Z","timestamp":1776074360412,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:00Z","timestamp":1772064000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:00Z","timestamp":1772064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Zero Trust is an approach allowing for increased security by providing an object or a subject with the three CIA (Confidentiality, Integrity, Availability) security aspects. To comply with the CIA criteria, access control models need to support functionalities such as: a) safer permission grant and authorization processes, b) policy decision delivery to single or multiple users, and c) policy decision delivery to single or multiple actions or objects. In addition, we need to consider redundancy, conflict detection, different types of permissions to delegate, delegation, and the separation of duties (SoD) with different types. Extensive literature exists with respect to delegation operations on access control models, but most of them do not consider redundancy or partial conflict detection with regard to the standard policies. We address the positive and negative policies resolution as a precursor to the delegation request resolution. We address the resolutions in context of the standard policies that allow or deny an action on the object to a single or multiple subjects. We provide an analysis via multiple case studies using a Python implementation of the HPol (Hierarchical Policy) model. Our analysis demonstrates the ability of the HPol model to handle access control resolution issues discussed, with proof of results in context of the positive and negative (YES &amp; NO) policy requests.<\/jats:p>","DOI":"10.1007\/s10207-025-01130-z","type":"journal-article","created":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:10:22Z","timestamp":1772111422000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Graph-based formal modeling and implementation of access control policies with automated conflict and redundancy detection"],"prefix":"10.1007","volume":"25","author":[{"given":"Azan Hamad","family":"Alkhorem","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Conte de Leon","sequence":"additional","affiliation":[]},{"given":"Ananth A.","family":"Jillepalli","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,26]]},"reference":[{"key":"1130_CR1","unstructured":"Alkhorem, A.H., Conte de Leon, D., Jillepalli, A.A.: A structured and comprehensive literature survey on access control delegation models and their properties and an analysis of knowledge gaps. In Preparation (2024)"},{"key":"1130_CR2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207","author":"S Rose","year":"2020","unstructured":"Rose, S., Borchert, O., Mitchell, S., Connelly, S.: Zero Trust Architecture (2020). https:\/\/doi.org\/10.6028\/NIST.SP.800-207","journal-title":"Zero Trust Architecture"},{"key":"1130_CR3","unstructured":"Patil, A., Meshram, P.B.B.: Database access control policies. (2012). https:\/\/api.semanticscholar.org\/CorpusID:14237624"},{"issue":"3","key":"1130_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.13052\/2245-1439.731","volume":"7","author":"G Karatas","year":"2018","unstructured":"Karatas, G., Akbulut, A.: Survey on access control mechanisms in cloud computing. Journal of Cyber Security and Mobility 7(3), 1\u201336 (2018). https:\/\/doi.org\/10.13052\/2245-1439.731","journal-title":"Journal of Cyber Security and Mobility"},{"key":"1130_CR5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7316","volume-title":"Assessment of Access Control Systems","author":"VC Hu","year":"2006","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, D.R., et al.: Assessment of Access Control Systems. National Institute of Standards and Technology .., US Department of Commerce (2006)"},{"issue":"4","key":"1130_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3007204","volume":"49","author":"D Servos","year":"2017","unstructured":"Servos, D., Osborn, S.L.: Current research and open problems in attribute-based access control. ACM Computing Surveys (CSUR) 49(4), 1\u201345 (2017)","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"162","key":"1130_CR7","first-page":"1","volume":"800","author":"VC Hu","year":"2013","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Friedman, A.R., Lang, A.J., Cogdell, M.M., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K., et al.: Guide to attribute based access control (abac) definition and considerations. NIST Spec. Publ. 800(162), 1\u201354 (2013)","journal-title":"NIST Spec. Publ."},{"issue":"4","key":"1130_CR8","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","volume":"11","author":"A Castiglione","year":"2015","unstructured":"Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., Huang, X.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850\u2013865 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1130_CR9","doi-asserted-by":"crossref","unstructured":"Samarati, P., Vimercati, S.D.C.: Access control: Policies, models, and mechanisms. In: Foundations of Security Analysis and Design (2000). https:\/\/api.semanticscholar.org\/CorpusID:9720393","DOI":"10.1007\/3-540-45608-2_3"},{"key":"1130_CR10","doi-asserted-by":"crossref","unstructured":"Casalino, M.M., Thion, R.: Refactoring multi-layered access control policies through (de)composition. Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), 243\u2013250 (2013)","DOI":"10.1109\/CNSM.2013.6727843"},{"issue":"4","key":"1130_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3706057","volume":"57","author":"SH Jayasundara","year":"2024","unstructured":"Jayasundara, S.H., Gamagedara Arachchilage, N.A., Russello, G.: Sok: access control policy generation from high-level natural language requirements. ACM Comput. Surv. 57(4), 1\u201337 (2024)","journal-title":"ACM Comput. Surv."},{"key":"1130_CR12","doi-asserted-by":"crossref","unstructured":"Leander, B., Johansson, B., Mubeen, S., Ashjaei, M., Lindstr\u00f6m, T.: Redundancy link security analysis: An automation industry perspective. In: 2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1\u20138 (2024). IEEE","DOI":"10.1109\/ETFA61755.2024.10710694"},{"issue":"1","key":"1130_CR13","doi-asserted-by":"publisher","first-page":"69","DOI":"10.3233\/MGS-230089","volume":"20","author":"A Qasim","year":"2024","unstructured":"Qasim, A., Ghouri, A., Munawar, A.: An effective approach for reducing data redundancy in multi-agent system communication. Multiagent and Grid Systems 20(1), 69\u201388 (2024)","journal-title":"Multiagent and Grid Systems"},{"key":"1130_CR14","doi-asserted-by":"crossref","unstructured":"Trinh$$^1$$, T.-B., To, V.-K., Truong, N.-T., Le, H.A.: Analysing conflict of interest integrated in role-based access control model using. In: Intelligence of Things: The Third International Conference on Intelligence of Things (ICIT 2024), Da Nang, Vietnam, September 12-14, 2024, Proceedings, Volume 1, p. 57 (2025). Springer Nature","DOI":"10.1007\/978-3-031-75593-4_6"},{"key":"1130_CR15","doi-asserted-by":"crossref","unstructured":"Xing, Y., Hu, L., Du, X., Shen, Z., Hu, J., Wang, F.: Ccdf-tap: A context-aware conflict detection framework for iot trigger-action programming with graph neural network. IEEE Internet of Things Journal (2024)","DOI":"10.1109\/JIOT.2024.3418459"},{"key":"1130_CR16","doi-asserted-by":"crossref","unstructured":"Aftab, M.U., Qin, Z., Hussain, K., Jamali, Z., Son, N.T., Nam, N.V., Dinh, T.V.: Negative authorization by implementing negative attributes in attribute-based access control model for internet of medical things. 2019 15th International Conference on Semantics, Knowledge and Grids (SKG), 167\u2013174 (2019)","DOI":"10.1109\/SKG49510.2019.00036"},{"key":"1130_CR17","doi-asserted-by":"publisher","unstructured":"Iyer, P., Masoumzadeh, A.: Mining positive and negative attribute-based access control policy rules. In: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, pp. 161\u2013172 (2018). https:\/\/doi.org\/10.1145\/3205977.3205988","DOI":"10.1145\/3205977.3205988"},{"key":"1130_CR18","unstructured":"Li, X., He, J., Zhang, T.: Negative authorization in access control for cloud computing. (2012). https:\/\/api.semanticscholar.org\/CorpusID:114125851"},{"key":"1130_CR19","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.sysarc.2010.04.005","volume":"57","author":"DF Ferraiolo","year":"2011","unstructured":"Ferraiolo, D.F., Atluri, V., Gavrila, S.I.: The policy machine: a novel architecture and framework for access control policy specification and enforcement. J. Syst. Archit. 57, 412\u2013424 (2011)","journal-title":"J. Syst. Archit."},{"key":"1130_CR20","unstructured":"Xia, Z., Jiang, Y., Zhong, Y., Zhang, S.: An access control policy for active networks. In: International Symposium on Computers and Communications (2004). https:\/\/api.semanticscholar.org\/CorpusID:195725244"},{"key":"1130_CR21","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26, 214\u2013260 (2001)","journal-title":"ACM Trans. Database Syst."},{"key":"1130_CR22","doi-asserted-by":"crossref","unstructured":"Olawsky, D.E., Fine, T., Schneider, E.A., Spencer, R.: Developing and using a \u201cpolicy neutral\u201d access control policy. In: New Security Paradigms Workshop (1996). https:\/\/api.semanticscholar.org\/CorpusID:3072656","DOI":"10.1145\/304851.304866"},{"key":"1130_CR23","unstructured":"Chen, M., Geng, X.: Redundancy policy for redundant protection. (2020). https:\/\/api.semanticscholar.org\/CorpusID:216515775"},{"key":"1130_CR24","doi-asserted-by":"crossref","unstructured":"Pal, S., Hitchens, M., Varadharajan, V., Rabehaja, T.M.: Policy-based access control for constrained healthcare resources. 2018 IEEE 19th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM), 588\u2013599 (2018)","DOI":"10.1109\/WoWMoM.2018.8449813"},{"key":"1130_CR25","doi-asserted-by":"publisher","unstructured":"Guarnieri, M., Neri, M.A., Magri, E., Mutti, S.: On the notion of redundancy in access control policies. In: ACM Symposium on Access Control Models and Technologies (2013). https:\/\/doi.org\/10.1145\/2462410.2462426","DOI":"10.1145\/2462410.2462426"},{"key":"1130_CR26","doi-asserted-by":"crossref","unstructured":"Bai, Q.-h., Zheng, Y.: Study on the access control model. Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference 1, 830\u2013834 (2011)","DOI":"10.1109\/CSQRWC.2011.6037079"},{"key":"1130_CR27","doi-asserted-by":"crossref","unstructured":"Kabra, G., Ramamurthy, R., Sudarshan, S.: Redundancy and information leakage in fine-grained access control. Proceedings of the 2006 ACM SIGMOD international conference on Management of data (2006)","DOI":"10.1145\/1142473.1142489"},{"key":"1130_CR28","doi-asserted-by":"crossref","unstructured":"Sarkis, L.C., Silva, V.T., Braga, C.: Detecting indirect conflicts between access control policies. Proceedings of the 31st Annual ACM Symposium on Applied Computing (2016)","DOI":"10.1145\/2851613.2851979"},{"key":"1130_CR29","doi-asserted-by":"crossref","unstructured":"St-Martin, M., Felty, A.P.: A verified algorithm for detecting conflicts in xacml access control rules. Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs (2016)","DOI":"10.1145\/2854065.2854079"},{"key":"1130_CR30","doi-asserted-by":"crossref","unstructured":"Fan, B., Liang, X., Luo, Y., Bo, Y., Xia, C.: Conflict detection model of access control policy in collaborative environment. 2011 International Conference on Computational and Information Sciences, 377\u2013381 (2011)","DOI":"10.1109\/ICCIS.2011.112"},{"key":"1130_CR31","doi-asserted-by":"publisher","unstructured":"Hein, P., Biswas, D., Martucci, L.A., M\u00fchlh\u00e4user, M.: Conflict detection and lifecycle management for access control in publish\/subscribe systems. 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering, 104\u2013111 (2011) https:\/\/doi.org\/10.1109\/HASE.2011.50","DOI":"10.1109\/HASE.2011.50"},{"key":"1130_CR32","doi-asserted-by":"crossref","unstructured":"Wu, B., Chen, X.-y., Zhang, Y.-f., Dai, X.-d.: An extensible intra access control policy conflict detection algorithm. 2009 International Conference on Computational Intelligence and Security 1, 483\u2013488 (2009)","DOI":"10.1109\/CIS.2009.248"},{"key":"1130_CR33","doi-asserted-by":"crossref","unstructured":"Adi, K., Bouzida, Y., Hattak, I., Logrippo, L., Mankovskii, S.: Typing for conflict detection in access control policies. In: International Conference on eTechnologies (2009). https:\/\/api.semanticscholar.org\/CorpusID:18784032","DOI":"10.1007\/978-3-642-01187-0_17"},{"key":"1130_CR34","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Amini, M., Jalili, R.: Conflict detection and resolution in context-aware authorization. 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW\u201907) 1, 505\u2013511 (2007)","DOI":"10.1109\/AINAW.2007.127"},{"key":"1130_CR35","doi-asserted-by":"crossref","unstructured":"Moon, C.-J., Paik, W., Kim, Y.-G., Kwon, J.: The conflict detection between permission assignment constraints in role-based access control. In: CISC (2005). https:\/\/api.semanticscholar.org\/CorpusID:21880847","DOI":"10.1007\/11599548_23"},{"key":"1130_CR36","doi-asserted-by":"crossref","unstructured":"Ruiz, J.A., Narendran, P., Masoumzadeh, A., Iyer, P.: Converting rule-based access control policies: From complemented conditions to deny rules. In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, pp. 159\u2013169 (2024)","DOI":"10.1145\/3649158.3657040"},{"key":"1130_CR37","doi-asserted-by":"crossref","unstructured":"Demirkiran, F., Masoumzadeh, A.: Enhancing relationship-based access control policies with negative rule mining (2025)","DOI":"10.1145\/3714393.3726510"},{"issue":"OOPSLA2","key":"1130_CR38","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1145\/3689738","volume":"8","author":"L D\u2019Antoni","year":"2024","unstructured":"D\u2019Antoni, L., Ding, S., Goel, A., Ramesh, M., Rungta, N., Sung, C.: Automatically reducing privilege for access control policies. Proceedings of the ACM on Programming Languages 8(OOPSLA2), 763\u2013790 (2024)","journal-title":"Proceedings of the ACM on Programming Languages"},{"key":"1130_CR39","doi-asserted-by":"crossref","unstructured":"Batra, G., Talegaon, S., Atluri, V., Vaidya, J., Sural, S.: Semantically correct policy mining and enforcement for attribute based access control. ACM Transactions on Internet Technology (2025)","DOI":"10.1145\/3736764"},{"key":"1130_CR40","doi-asserted-by":"crossref","unstructured":"Mehra, T.: Building a resilient backup infrastructure: Combining data redundancy, encryption, and rbac for maximum protection (2025)","DOI":"10.55041\/IJSREM41975"},{"key":"1130_CR41","doi-asserted-by":"crossref","unstructured":"Laouar, A., Belabbes, S., Benferhat, S.: Conflict handling strategies for partially ordered access control security policies. In: 2024 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), pp. 1\u20136 (2024). IEEE","DOI":"10.1109\/PACRIM61180.2024.10690228"},{"key":"1130_CR42","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.cose.2017.07.010","volume":"70","author":"A Ahmad","year":"2017","unstructured":"Ahmad, A., Whitworth, B., Zeshan, F., Bertino, E., Friedman, R.: Extending social networks with delegation. Computers & Security 70, 546\u2013564 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.07.010","journal-title":"Computers & Security"},{"key":"1130_CR43","doi-asserted-by":"publisher","unstructured":"Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H., Ali, Q.E.: Blockchain based permission delegation and access control in internet of things (baci). Computers & Security 86, 318\u2013334 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.06.010","DOI":"10.1016\/j.cose.2019.06.010"},{"key":"1130_CR44","doi-asserted-by":"publisher","unstructured":"Ben-Ghorbel-Talbi, C. Meriam, Fr\u00e9d\u00e9ric, C.B., Nora -\u00a0Bouhoula, A.: A delegation model for extended rbac. International Journal of Information Security 9(3), 209\u2013236 (2010). https:\/\/doi.org\/10.1007\/s10207-010-0104-3","DOI":"10.1007\/s10207-010-0104-3"},{"key":"1130_CR45","doi-asserted-by":"publisher","unstructured":"Daud, M.I., S\u00e1nchez, D., Viejo, A.: Ontology-based delegation of access control: An enhancement to the xacml delegation profile. In: International Conference on Trust and Privacy in Digital Business, pp. 18\u201329 (2015). https:\/\/doi.org\/10.1007\/978-3-319-22906-5_2 . Springer","DOI":"10.1007\/978-3-319-22906-5_2"},{"key":"1130_CR46","doi-asserted-by":"publisher","unstructured":"Ghorbel-Talbi, M.B., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: Managing delegation in access control models. In: 15th International Conference on Advanced Computing and Communications (ADCOM 2007), pp. 744\u2013751 (2007). https:\/\/doi.org\/10.1109\/ADCOM.2007.105 . IEEE","DOI":"10.1109\/ADCOM.2007.105"},{"key":"1130_CR47","doi-asserted-by":"publisher","unstructured":"Ruan, C., Varadharajan, V.: Reasoning about dynamic delegation in role based access control systems. In: International Conference on Database Systems for Advanced Applications, pp. 239\u2013253 (2011). https:\/\/doi.org\/10.1007\/978-3-642-20149-3_19 . Springer","DOI":"10.1007\/978-3-642-20149-3_19"},{"key":"1130_CR48","doi-asserted-by":"publisher","unstructured":"Zhang, L., Ahn, G.-J.: Constrained role-based delegation. In: Gritzalis, D., Vimercati, S., Samarati, P., Katsikas, S. (eds.) Security and Privacy in the Age of Uncertainty, pp. 289\u2013300. Springer, Boston, MA (2003). https:\/\/doi.org\/10.1007\/978-0-387-35691-4_25","DOI":"10.1007\/978-0-387-35691-4_25"},{"key":"1130_CR49","unstructured":"Leon, D.F.: Completeness of implementation traceability for the development of high assurance and critical computing systems. University of Idaho (2006)"},{"key":"1130_CR50","doi-asserted-by":"publisher","unstructured":"De\u00a0Leon, D.C., Alves-Foss, J., Oman, P.W.: Implementation-oriented secure architectures. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS\u201907), pp. 278\u2013278 (2007). https:\/\/doi.org\/10.1109\/HICSS.2007.264","DOI":"10.1109\/HICSS.2007.264"},{"key":"1130_CR51","doi-asserted-by":"publisher","unstructured":"Jillepalli, A., Leon, D.C., Steiner, S., Sheldon, F.T.: Hermes: A high-level policy language for high-granularity enterprise-wide secure browser configuration management. In: 2016 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1\u20139 (2016). https:\/\/doi.org\/10.1109\/SSCI.2016.7849914","DOI":"10.1109\/SSCI.2016.7849914"},{"issue":"1","key":"1130_CR52","first-page":"118","volume":"33","author":"DC Leon","year":"2017","unstructured":"Leon, D.C., Brown, M.G., Jillepalli, A.A., Stalick, A.Q., Alves-Foss, J.: High-level and formal router policy verification. J. Comput. Sci. Coll. 33(1), 118\u2013128 (2017)","journal-title":"J. Comput. Sci. Coll."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01130-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01130-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01130-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:18:25Z","timestamp":1776071905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01130-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,26]]},"references-count":52,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1130"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01130-z","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,26]]},"assertion":[{"value":"24 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"No.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}},{"value":"Consent is provided by all the authors for submitting this manuscript to Springer Nature: Computer Science. No human or animal subjects were involved in this work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"61"}}