{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:31Z","timestamp":1761621391381,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T00:00:00Z","timestamp":1530748800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11036-018-1085-0","type":"journal-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T18:38:07Z","timestamp":1530815887000},"page":"839-852","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5266-9975","authenticated-orcid":false,"given":"Hsing-Chung","family":"Chen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,5]]},"reference":[{"key":"1085_CR1","unstructured":"Chen H-C (2017) A cooperative RBAC-based IoTs server with hierarchical trust evaluation mechanism. Proceedings of IoTaaS 2017 \u2013 3rd EAI International Conference on IoT as a Service, Sept. 20\u201322, 2017, Taichung, Taiwan"},{"key":"1085_CR2","unstructured":"Chen H-C, Chang C-H, Leu F-Y (2017) Implement of agent with role-based hierarchy access control for secure grouping IoTs. The14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp120\u2013125, Las Vegas, USA, 8\u201311 Jan. 2017"},{"key":"1085_CR3","doi-asserted-by":"crossref","unstructured":"Zhong S, Zhang L, Chen H-C, Zhao H, Guo L (2017) Study of the patterns of automatic car washing in the era of internet of things. The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp. 82\u201386, Tamkang University, Taipei, Taiwan, Mar 27\u201329, 2017","DOI":"10.1109\/WAINA.2017.132"},{"key":"1085_CR4","unstructured":"5G Americas (2017) LTE progress leading to the 5G massive internet of things. 3GPP enhancements up to release 14 [On-line] http:\/\/www.5gamericas.org\/files\/8415\/1250\/0673\/LTE_Progress_Leading_to_the_5G_Massive_Internet_of_Things_Final_12.5.pdf ,Retrieved on Mar. 08, 2018"},{"key":"1085_CR5","unstructured":"Linko S, Garsbo C, Shi L (2017) Massive IoT: different technologies for different needs-wide area mesh networks can meet the requirements for large-scale IoT. Northstream White Paper, Wirepas & Northstream, Jun. 29, 2017. [Online] https:\/\/wirepas.com\/download\/"},{"key":"1085_CR6","unstructured":"Patel M, Shangkuan J, Thomas C (2017) What\u2019s new with the Internet of Things? McKinsey & Company. Retrieved from http:\/\/www.mckinsey.com\/industries\/semiconductors\/our-insights\/whats-new-with-the-internet-of-things"},{"key":"1085_CR7","unstructured":"Cardoza C (2017) Solving the internet of things integration problem. SD Times, Jan. 25, 2017. [Online] https:\/\/sdtimes.com\/developers\/solving-internet-things-integration-problem\/ , Retrieved on Mar. 08, 2018"},{"key":"1085_CR8","unstructured":"Malhan M, Filipovic S (2017) Network services for massive IoT. Ericsson [Online] https:\/\/www.ericsson.com\/en\/networks\/offerings\/cellular-iot\/network-services-massive-iot , Retrieved on Mar. 08, 2018"},{"issue":"3","key":"1085_CR9","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"SG Akl","year":"1983","unstructured":"Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239\u2013248","journal-title":"ACM Trans Comput Syst"},{"key":"1085_CR10","unstructured":"Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In: Proceedings of the 15th national computer security conference, pp 554\u2013563, Oct 13\u201316, 1992"},{"key":"1085_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29:38\u201347","journal-title":"Computer"},{"key":"1085_CR12","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/978-81-322-2126-5_89","volume":"324","author":"B Balamurugan","year":"2015","unstructured":"Balamurugan B, Krishna PV (2015) Enhanced role-based access control for cloud security. Artificial intelligence and evolutionary algorithms in engineering systems. Adv Intell Syst Comput 324:837\u2013852","journal-title":"Adv Intell Syst Comput"},{"key":"1085_CR13","unstructured":"Chen H-C (2015) A trusted user-to-role and role-to-key access control scheme. Soft Comput 1\u201313"},{"key":"1085_CR14","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. Security and Privacy Workshops (SPW), 2015 IEEE CS Security and Privacy Workshops, pp 180\u2013184","DOI":"10.1109\/SPW.2015.27"},{"issue":"3","key":"1085_CR15","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/s11390-012-1238-8","volume":"27","author":"Z Yu","year":"2012","unstructured":"Yu Z, Yu T (2012) Mining trust relationships from online social networks. J Comput Sci Technol 27(3):492\u2013505","journal-title":"J Comput Sci Technol"},{"issue":"6","key":"1085_CR16","first-page":"7814","volume":"5","author":"D Mishra","year":"2014","unstructured":"Mishra D, Soni D (2014) A comprehensive overview on data mining: approaches and applications. Int J of Computer Science and Information Technologies 5(6):7814\u20137816","journal-title":"Int J of Computer Science and Information Technologies"},{"issue":"4","key":"1085_CR17","first-page":"52","volume":"4","author":"H-C Chen","year":"2014","unstructured":"Chen H-C, Su H-K( 2014) A cooperative trust bit-map routing protocol using the GA algorithm for reducing the damages from the InTs in WANETs. J of Internet Services and Information Security 4(4):52\u201370","journal-title":"J of Internet Services and Information Security"},{"issue":"2","key":"1085_CR18","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/JSYST.2015.2437285","volume":"11","author":"H-C Chen","year":"2017","unstructured":"Chen H-C (2017) TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst J 11(2):449\u2013459","journal-title":"IEEE Syst J"},{"key":"1085_CR19","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/j.procs.2014.05.544","volume":"32","author":"Z Trifa","year":"2014","unstructured":"Trifa Z, Khemakhem M (2014) Sybil nodes as a mitigation strategy against Sybil attack. Procedia Computer Science 32:1135\u20131140","journal-title":"Procedia Computer Science"},{"issue":"1","key":"1085_CR20","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1504\/IJWGS.2017.082076","volume":"13","author":"H-C Chen","year":"2017","unstructured":"Chen H-C (2017) A negotiation-based cooperative RBAC scheme. Int J Web Grid Serv 13(1):94\u2013111","journal-title":"Int J Web Grid Serv"},{"issue":"2","key":"1085_CR21","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1007\/s11227-013-1017-5","volume":"66","author":"H-C Chen","year":"2013","unstructured":"Chen H-C, Violetta MA, Yang C-Y (2013) Contract RBAC in cloud computing. J Supercomput 66(2):1111\u20131131","journal-title":"J Supercomput"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1085-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1085-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1085-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T15:09:23Z","timestamp":1693753763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1085-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,5]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1085"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1085-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2018,7,5]]},"assertion":[{"value":"5 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}