{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:20:25Z","timestamp":1759990825679,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/bigdata.2013.6691798","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T14:11:49Z","timestamp":1388758309000},"page":"45-47","source":"Crossref","is-referenced-by-count":23,"title":["Access control for big data using data content"],"prefix":"10.1109","author":[{"given":"Wenrong","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Yuhao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/69.567051"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1561\/1900000014"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45608-2_3","article-title":"Access control: Policies, models, and mechanisms","author":"samarati","year":"2001","journal-title":"Foundations of Security Analysis and Design"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/69.991718"},{"key":"7","volume":"4","author":"hoare","year":"1961","journal-title":"Algorithm 65 Find Commu ACM"},{"journal-title":"Content-based Access Control","year":"2011","author":"hart","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/320473.320482"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2007.10"},{"key":"9","volume":"3","author":"knuth","year":"1998","journal-title":"The Art of Computer Programming Sorting and Searching"},{"key":"8","first-page":"402","article-title":"A policy based approach to security for the semantic web","author":"kagal","year":"2003","journal-title":"The Semantic Web-ISWC"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232473"}],"event":{"name":"2013 IEEE International Conference on Big Data","start":{"date-parts":[[2013,10,6]]},"location":"Silicon Valley, CA, USA","end":{"date-parts":[[2013,10,9]]}},"container-title":["2013 IEEE International Conference on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679357\/6690588\/06691798.pdf?arnumber=6691798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:14:52Z","timestamp":1498094092000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6691798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2013.6691798","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}