{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T03:14:12Z","timestamp":1775358852773,"version":"3.50.1"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Major Scientific and Technological Special Project of Guizhou Province","award":["20183001"],"award-info":[{"award-number":["20183001"]}]},{"name":"Open Funding of the Guizhou Provincial Key Laboratory of Public Big Data","award":["2017BDKFJJ006"],"award-info":[{"award-number":["2017BDKFJJ006"]}]},{"name":"Open Funding of the Hubei Provincial Key Laboratory of Intelligent Geo-Information Processing","award":["KLIGIP2016A05"],"award-info":[{"award-number":["KLIGIP2016A05"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502362"],"award-info":[{"award-number":["61502362"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2870148","type":"journal-article","created":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T21:37:53Z","timestamp":1537220273000},"page":"51748-51755","source":"Crossref","is-referenced-by-count":1,"title":["Lico: A Lightweight Access Control Model for Inter-Networking Linkages"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9403-9309","authenticated-orcid":false,"given":"Simin","family":"Li","sequence":"first","affiliation":[]},{"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3411-7947","authenticated-orcid":false,"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"ref14","first-page":"74","article-title":"An attribute-based access control model for Web services","author":"shen","year":"2006","journal-title":"Proc IEEE 7th Int Conf Parallel Distrib Comput Appl Technol (PDCAT)"},{"key":"ref15","first-page":"309","article-title":"Fine-grained access control for HTML5-based mobile applications in Android","author":"jin","year":"2015","journal-title":"Proc 16th Int Inf Security Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"ref17","first-page":"462","article-title":"A framework for risk-aware role based access control","author":"bijon","year":"2013","journal-title":"Proc IEEE Conf Commun Netw Secur (CNS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.003"},{"key":"ref4","first-page":"137","article-title":"Access control: Policies, models, and mechanisms","author":"samarati","year":"2001","journal-title":"Proc Int School Found Secur Anal Des"},{"key":"ref3","first-page":"18","article-title":"Protection","volume":"1","author":"lampson","year":"1974","journal-title":"Proc 5th Princeton Symp of Info Sci and Syst"},{"key":"ref6","first-page":"166","article-title":"Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management","author":"thomas","year":"1997","journal-title":"Proc 11th IFIP WG11 3 Conf Database Secur"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/373256.373258","article-title":"Securing context-aware applications using environment roles","volume":"5","author":"covington","year":"2001","journal-title":"Proc 6th ACM Symp Access Control Models Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.185"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref9","first-page":"379","article-title":"AWare: Preventing abuse of privacy-sensitive sensors via operation bindings","author":"petracca","year":"2017","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.09.001"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08466580.pdf?arnumber=8466580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T05:30:05Z","timestamp":1693891805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8466580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2870148","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}