{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T22:22:49Z","timestamp":1771971769375,"version":"3.50.1"},"reference-count":25,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,7,2]]},"DOI":"10.1080\/10798587.2015.1132586","type":"journal-article","created":{"date-parts":[[2016,2,17]],"date-time":"2016-02-17T12:12:19Z","timestamp":1455711139000},"page":"345-352","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":13,"title":["Secure Access Control of E-Health System with Attribute-Based Encryption"],"prefix":"10.32604","volume":"22","author":[{"given":"Hongyang","family":"Yan","sequence":"first","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Gansen","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Sun-Young","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,2,17]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.4018\/IJDET"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"CIT0004","first-page":"53","volume-title":"the 14th International Conference on Practice and Theory in Public Key Cryptography","author":"Brent W.","year":"2011"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9873-8"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1145\/1315245"},{"key":"CIT0008","first-page":"3","volume":"5","author":"Clementine G.","year":"2014","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00843-6"},{"key":"CIT0010","first-page":"99","author":"Goyal V.","year":"2006","journal-title":"ACM conference on Computer and Communications Security"},{"key":"CIT0011","first-page":"34","author":"Green M.","year":"2011","journal-title":"SEC\u201911: Proceedings of the 20th USENLX conference on Security"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"key":"CIT0013","first-page":"98","volume":"6","author":"Lewis N.","year":"2015","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2"},{"key":"CIT0016","first-page":"20","author":"Muller S.","year":"2009","journal-title":"Information Security and Cryptology"},{"key":"CIT0017","first-page":"195","author":"Ostrovsky R.","year":"2007","journal-title":"the 14th ACM Conference on Computer and Communications Security"},{"key":"CIT0018","first-page":"99","author":"Pirretti M.","year":"2006","journal-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC"},{"key":"CIT0020","first-page":"457","author":"Sahai A.","year":"2005","journal-title":"EUROCRYPT, LNCS3494"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2025"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.65"},{"key":"CIT0023","first-page":"61","volume":"3","author":"Wang J.F.","year":"2012","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755720"},{"key":"CIT0026","first-page":"213","author":"Zheng Q.J.","year":"2001","journal-title":"CRYPTO, LNCS2139"},{"key":"CIT0027","first-page":"37","author":"Zhou Z.","year":"2012","journal-title":"8th International Conference on Network and Service Management (CNSM)"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1132586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:08:46Z","timestamp":1591189726000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1132586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,17]]},"references-count":25,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,12,21]]},"published-print":{"date-parts":[[2016,7,2]]}},"alternative-id":["10.1080\/10798587.2015.1132586"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2015.1132586","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}