{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T06:07:05Z","timestamp":1776406025136,"version":"3.51.2"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"S3","license":[{"start":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T00:00:00Z","timestamp":1450742400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the National High Technology Research and Development Program of China","award":["2013BAD15B02"],"award-info":[{"award-number":["2013BAD15B02"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J  Syst  Assur  Eng  Manag"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s13198-015-0411-1","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T07:27:55Z","timestamp":1450769275000},"page":"1966-1975","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A cloud-user behavior assessment based dynamic access control model"],"prefix":"10.1007","volume":"8","author":[{"given":"Xu","family":"Jing","sequence":"first","affiliation":[]},{"given":"Zhengnan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shuqin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Gexu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,22]]},"reference":[{"key":"411_CR1","unstructured":"ANSI INCITS (2004) Role-based access control. ANSI INCITS 359-2004, American National Standards Institute, International Committee for Information Technology Standards 35(6):37\u201350"},{"key":"411_CR2","doi-asserted-by":"crossref","unstructured":"Burnett C, Chen L, Edwards P et al (2014) TRAAC: trust and risk aware access control. In: IEEE PST, Toronto","DOI":"10.1109\/PST.2014.6890962"},{"issue":"8","key":"411_CR3","first-page":"1818","volume":"39","author":"YR Chen","year":"2011","unstructured":"Chen YR, Tian LQ, Yang Y (2011) Model and analysis of user behavior based on dynamic game theory in cloud computing. Acta Electron Sin 39(8):1818\u20131823","journal-title":"Acta Electron Sin"},{"issue":"1","key":"411_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3724\/SP.J.10012011.03958","volume":"22","author":"GD Feng","year":"2011","unstructured":"Feng GD, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22(1):71\u201383. doi:\n                        10.3724\/SP.J.10012011.03958","journal-title":"J Softw"},{"key":"411_CR5","unstructured":"GB\/T 20984-2007 (2007) Information security technology\u2014risk assessment specification for information security"},{"key":"411_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-24747-0_11","volume":"2","author":"A Josang","year":"2004","unstructured":"Josang A, Lo Presti S (2004) Analysing the relationship between risk and trust. Trust Manag 2:135\u2013145. doi:\n                        10.1007\/978-3-540-24747-0_11","journal-title":"Trust Manag"},{"issue":"4","key":"411_CR7","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/CC.2014.6827577","volume":"11","author":"G Lin","year":"2014","unstructured":"Lin G, Wang D, Bie YY et al (2014) MTBAC: a mutual trust based access control model in cloud computing. China Commun 11(4):154\u2013162. doi:\n                        10.1109\/CC.2014.6827577","journal-title":"China Commun"},{"issue":"8","key":"411_CR8","first-page":"1414","volume":"48","author":"W Liu","year":"2011","unstructured":"Liu W, Duan HX, Zhang H, Ren P, Wu JP (2011) TRBAC: trust based access control model. J Comput Res Dev 48(8):1414\u20131420","journal-title":"J Comput Res Dev"},{"issue":"7","key":"411_CR9","doi-asserted-by":"publisher","first-page":"320","DOI":"10.4156\/jdcta.vol5.issue7.40","volume":"5","author":"SN Ma","year":"2011","unstructured":"Ma SN, He JS, Gao F, Zhang YQ (2011) Access control model based on trust. Int J Digit Content Technol Appl 5(7):320\u2013325. doi:\n                        10.4156\/jdcta.vol5.issue7.40","journal-title":"Int J Digit Content Technol Appl"},{"key":"411_CR10","doi-asserted-by":"crossref","unstructured":"Mahalle PN, Thakre P, Prasad NR et al (2013) A fuzzy approach to trust based access control in internet of things. In: IEEE VITAE, Atlantic City","DOI":"10.1109\/VITAE.2013.6617083"},{"issue":"9","key":"411_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R Sandhu","year":"1994","unstructured":"Sandhu R, Ravi SS, Samarati P (1994) Access control: principles and practice. IEEE Commun Mag 32(9):40\u201348. doi:\n                        10.1109\/35.312842","journal-title":"IEEE Commun Mag"},{"key":"411_CR12","doi-asserted-by":"crossref","unstructured":"Tan Z, Tang Z, Li R et al (2011) Research on trust-based access control model in cloud computing. In: IEEE ITAIC, Chongqing","DOI":"10.1109\/ITAIC.2011.6030345"},{"issue":"19","key":"411_CR13","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3778\/j.issn.1002-8331.2008.19.004","volume":"44","author":"LQ Tian","year":"2008","unstructured":"Tian LQ, Ji TG, Lin C, Yang Y (2008) Kind of user behavior trust and role based dynamic access control model. Comput Eng Appl 44(19):12\u201315. doi:\n                        10.3778\/j.issn.1002-8331.2008.19.004","journal-title":"Comput Eng Appl"},{"key":"411_CR14","unstructured":"Visintine V (2003) An introduction to information risk assessment. SANS Institute. \n                        http:\/\/59.67.152.3\/network\/tp\/papers\/paper_security\/IT_risk.pdf\n                        \n                    . Accessed 18 Dec 2015"},{"key":"411_CR15","doi-asserted-by":"crossref","unstructured":"Wang W, Han J, Song M et al (2011) The design of a trust and role based access control model in cloud computing. In: IEEE ICPCA, Port Elizabeth","DOI":"10.1109\/ICPCA.2011.6106526"},{"issue":"4","key":"411_CR16","doi-asserted-by":"publisher","first-page":"688","DOI":"10.3724\/SP.J.1016.2009.00688","volume":"32","author":"RL Zhang","year":"2009","unstructured":"Zhang RL, Wu XN, Zhou SY, Dong XS (2009) A trust model based on behaviors risk evaluation. Chin J Comput 32(4):688\u2013698. doi:\n                        10.3724\/SP.J.1016.2009.00688","journal-title":"Chin J Comput"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0411-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-015-0411-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0411-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0411-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T14:48:50Z","timestamp":1559486930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-015-0411-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,22]]},"references-count":16,"journal-issue":{"issue":"S3","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["411"],"URL":"https:\/\/doi.org\/10.1007\/s13198-015-0411-1","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,22]]}}}