{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:53:47Z","timestamp":1762955627407,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/apcc.2016.7581476","type":"proceedings-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T22:01:22Z","timestamp":1475791282000},"page":"559-566","source":"Crossref","is-referenced-by-count":3,"title":["Exploring the flexibility of network access control in the recursive InterNetwork Architecture"],"prefix":"10.1109","author":[{"given":"Ichrak","family":"Amdouni","sequence":"first","affiliation":[]},{"given":"Fatma","family":"Hrizi","sequence":"additional","affiliation":[]},{"given":"Anis","family":"Laouiti","sequence":"additional","affiliation":[]},{"given":"Eduard","family":"Grasa","sequence":"additional","affiliation":[]},{"given":"Hakima","family":"Chaouchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"800","article-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations","author":"hu","year":"2014","journal-title":"NIST Special Publication"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/365230.365252"},{"key":"ref12","article-title":"A Survey of Access Control Policies","author":"crowel","year":"0","journal-title":"scholarly paper"},{"key":"ref13","article-title":"Distributed Capability based Access Control for the Internet of Things","volume":"3","author":"ramos","year":"2013","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"year":"0","journal-title":"Web page of technical support IT solutions blog","key":"ref14"},{"key":"ref15","article-title":"Json Web token (JWT)","volume":"7519","author":"jones","year":"2015","journal-title":"IETF RFC"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1080\/00207160.2014.915316"},{"year":"0","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICC.2016.7510711"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1544012.1544079"},{"year":"0","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MNET.2014.6786609"},{"key":"ref8","article-title":"ACLs dont","author":"close","year":"2009","journal-title":"HP Laboratories Technical Report"},{"key":"ref7","article-title":"Access Control Systems - Security, Identity Management, and Trust Models","author":"benantar","year":"2006","journal-title":"Springer book"},{"year":"2009","author":"krohn","article-title":"Stateful firewall protection for control plane traffic within a network device","key":"ref2"},{"key":"ref1","article-title":"Protecting the router control plane","volume":"6192","author":"dugal","year":"2011","journal-title":"IETF RFC"},{"key":"ref9","first-page":"241","article-title":"Role based access control (RBAC): Features and motivations","author":"ferraiolo","year":"0"},{"year":"0","key":"ref20"},{"year":"0","key":"ref22"},{"year":"0","key":"ref21"},{"year":"0","key":"ref23"}],"event":{"name":"2016 22nd Asia-Pacific Conference on Communications (APCC)","start":{"date-parts":[[2016,8,25]]},"location":"Yogyakarta, Indonesia","end":{"date-parts":[[2016,8,27]]}},"container-title":["2016 22nd Asia-Pacific Conference on Communications (APCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7579293\/7581416\/07581476.pdf?arnumber=7581476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T06:58:18Z","timestamp":1478069898000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7581476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/apcc.2016.7581476","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}