{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:40:38Z","timestamp":1761324038436},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T00:00:00Z","timestamp":1453334400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11042-016-3269-6","type":"journal-article","created":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T09:48:03Z","timestamp":1453369683000},"page":"14263-14280","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A fine-grained context-aware access control model for health care and life science linked data"],"prefix":"10.1007","volume":"75","author":[{"given":"Zhengtao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jiandong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,21]]},"reference":[{"issue":"3","key":"3269_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jswis.2009081901","volume":"5","author":"T Berners-Lee","year":"2009","unstructured":"Berners-Lee T (2009) Linked data-the story so far. Int J Semant Web Inf Syst 5(3):1\u201322","journal-title":"Int J Semant Web Inf Syst"},{"key":"3269_CR2","doi-asserted-by":"crossref","unstructured":"Carminati B, Ferrari E, Heatherly R et al (2009) A semantic web based framework for social network access control. Proceedings of the 14th ACM symposium on Access control models and technologies, ACM: New York, pp 177\u2013186","DOI":"10.1145\/1542207.1542237"},{"issue":"5","key":"3269_CR3","doi-asserted-by":"crossref","first-page":"2517","DOI":"10.1109\/TSG.2014.2344024","volume":"5","author":"L Che","year":"2014","unstructured":"Che L, Shahidehpour M (2014) Dc microgrids: economic operation and enhancement of resilience by hierarchical control[J]. Smart Grid IEEE Trans 5(5):2517\u20132526","journal-title":"Smart Grid IEEE Trans"},{"issue":"3","key":"3269_CR4","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1007\/s11227-013-0980-1","volume":"67","author":"C Choi","year":"2014","unstructured":"Choi C, Choi J, Kim P (2014) Ontology-based access control model for security policy reasoning in cloud computing. J Supercomput 67(3):711\u2013722","journal-title":"J Supercomput"},{"key":"3269_CR5","unstructured":"Costabello L, Villata S, Delaforge N et al (2012) Linked data access goes mobile: Context-aware authorization for graph stores. LDOW-5th WWW Workshop on Linked Data on the Web 21(2):14\u201316"},{"key":"3269_CR6","doi-asserted-by":"crossref","unstructured":"Costabello L, Villata S, Rocha OR et al (2013) Access control for HTTP operations on linked data. The Semantic Web: semantics and big data, Springer Berlin Heidelberg, pp 185\u2013199","DOI":"10.1007\/978-3-642-38288-8_13"},{"key":"3269_CR7","doi-asserted-by":"crossref","unstructured":"Hassanzadeh O, Miller RJ (2015) Automatic curation of clinical trials data in LinkedCT. The semantic Web-ISWC 2015. Springer International Publishing, pp 270\u2013278","DOI":"10.1007\/978-3-319-25010-6_16"},{"issue":"1","key":"3269_CR8","first-page":"1","volume":"1","author":"T Heath","year":"2011","unstructured":"Heath T, Bizer C (2011) Linked data: evolving the web into a global data space. Synth Lect Semant Web: Theor Technol 1(1):1\u2013136","journal-title":"Synth Lect Semant Web: Theor Technol"},{"key":"3269_CR9","unstructured":"Hollenbach J, Presbrey J, Berners-Lee T (2009) Using rdf metadata to enable access control on the social semantic web. Proceedings of the Workshop on Collaborative Construction, Management and Linking of Structured Knowledge (CK2009) 6644(2):405\u2013420"},{"key":"3269_CR10","unstructured":"Jiang D, Ying X, Han Y et al (2015) Collaborative multi-hop routing in cognitive wireless networks[J]. Wirel Pers Commun:1\u201323"},{"key":"3269_CR11","doi-asserted-by":"crossref","unstructured":"Kayes ASM, Han J, Colman A (2012) ICAF: a context-aware framework for access control. Information Security and Privacy, Springer Berlin Heidelberg, pp 442\u2013449","DOI":"10.1007\/978-3-642-31448-3_34"},{"key":"3269_CR12","doi-asserted-by":"crossref","unstructured":"Li X, Lv Z, Hu J et al (2015) Traffic management and forecasting system based on 3D GIS. IEEE International Symposium on Cluster, Cloud and Grid Computing (CCGrid)","DOI":"10.1109\/CCGrid.2015.62"},{"key":"3269_CR13","doi-asserted-by":"crossref","unstructured":"Li T, Zhou X, Wang K et al (2015) A convergence of key\u2010value storage systems from clouds to supercomputers[J]. Concurr Comput: Pract Experience","DOI":"10.1002\/cpe.3614"},{"issue":"8","key":"3269_CR14","doi-asserted-by":"crossref","first-page":"20925","DOI":"10.3390\/s150820925","volume":"15","author":"Y Lin","year":"2015","unstructured":"Lin Y, Yang J, Lv Z et al (2015) A self-assessment stereo capture model applicable to the internet of things. Sensors 15(8):20925\u201320944","journal-title":"Sensors"},{"key":"3269_CR15","doi-asserted-by":"crossref","unstructured":"Lv Z, Yin T, Han Y et al (2011) WebVR\u2014\u2014Web virtual reality engine based on P2P network[J]. J Netw 6(7)","DOI":"10.4304\/jnw.6.7.990-998"},{"key":"3269_CR16","unstructured":"Muhleisen H, Kost M, Freytag JC (2010) SWRL-based access policies for linked data. Proceeding of the 2nd Workshop on Trust and Privacy on the Social and Semantic Web, Heraklion"},{"key":"3269_CR17","unstructured":"Sacco O, Passant A (2011) A Privacy Preference Ontology (PPO) for linked data, In Linked Data on the Web Workshop at the World Wide Web Conference"},{"key":"3269_CR18","unstructured":"Sahay R, Zimmermann A, Fox R et al (2014) A formal investigation of semantic interoperability of HCLS systems. Healthc Adm: Concepts Methodologies Tools Appl: Concepts Methodologies Tools Appl:177"},{"key":"3269_CR19","doi-asserted-by":"crossref","unstructured":"Sandhu R (2015) Attribute-based access control models and beyond. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ACM, pp 677\u2013677","DOI":"10.1145\/2714576.2749229"},{"issue":"1","key":"3269_CR20","first-page":"18","volume":"3","author":"H Shen","year":"2011","unstructured":"Shen H, Cheng Y (2011) A semantic context-based model for mobile web services access control. Int J Comput Netw Inf Secur (IJCNIS) 3(1):18\u201325","journal-title":"Int J Comput Netw Inf Secur (IJCNIS)"},{"key":"3269_CR21","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cag.2015.07.019","volume":"54","author":"T Su","year":"2016","unstructured":"Su T, Wang W, Lv Z et al (2016) Rapid Delaunay triangulation for randomly distributed point cloud data using adaptive Hilbert curve. Comput Graph 54:65\u201374","journal-title":"Comput Graph"},{"key":"3269_CR22","unstructured":"The Prot\u00e9g\u00e9 Ontology Editor and Knowledge Acquisition System. http:\/\/protege.stanford.edu\/"},{"key":"3269_CR23","doi-asserted-by":"crossref","unstructured":"Villata S, Delaforge N, Gandon F et al (2011) An access control model for linked data. On the move to meaningful internet systems: OTM 2011 Workshops. Springer Berlin Heidelberg, pp 454\u2013463","DOI":"10.1007\/978-3-642-25126-9_57"},{"issue":"3","key":"3269_CR24","first-page":"516","volume":"32","author":"YZ Wang","year":"2009","unstructured":"Wang YZ, Feng DG (2009) A conflict and redundancy analysis method for XACML rules. Chin J Comput 32(3):516\u2013530","journal-title":"Chin J Comput"},{"key":"3269_CR25","unstructured":"XACML and RDF (2008) https:\/\/wiki.oasis-open.org\/xacml\/XACMLandRDF"},{"key":"3269_CR26","doi-asserted-by":"crossref","unstructured":"Yague MI, Ma\u00f1a A, L\u00f3pez J et al (2003) Applying the semantic web layers to access control. Database and expert systems applications. Proceedings. 14th International Workshop on. IEEE, 2003:622\u2013626","DOI":"10.1109\/DEXA.2003.1232091"},{"key":"3269_CR27","doi-asserted-by":"crossref","unstructured":"Yang J, He S, Lin Y et al (2015) Multimedia cloud transmission and storage system based on internet of things. Multimed Tools Appl 1\u201316","DOI":"10.1007\/s11042-015-2967-9"},{"key":"3269_CR28","doi-asserted-by":"crossref","unstructured":"Zhang S, Zhang X, Ou X (2014) After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud[C]. Proceedings of the 9th ACM symposium on Information, computer and communications security. ACM, pp 317\u2013328","DOI":"10.1145\/2590296.2590300"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3269-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3269-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3269-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3269-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T21:53:47Z","timestamp":1567547627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3269-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,21]]},"references-count":28,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["3269"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3269-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,21]]}}}