{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:54:43Z","timestamp":1772934883972,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401974","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"7863-7872","source":"Crossref","is-referenced-by-count":0,"title":["Decentralized Identification and Communitycorroborated for Multi-Agent Access Control and Trust Management"],"prefix":"10.1109","author":[{"given":"Zhixiong","family":"Chden","sequence":"first","affiliation":[{"name":"Mercy University,Math &#x0026; CS,New York,USA"}]},{"given":"Tianyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Mercy University,Math &#x0026; CS,New York,USA"}]},{"given":"Nianjun","family":"Zhou","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center,New York,USA"}]},{"given":"Deming","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Illinois of Urbana-Champaign,Illinois,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644682"},{"key":"ref2","article-title":"Computer Security: Art and Science","author":"Bishop","year":"2018","journal-title":"Addison-Wesley Professional"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174679"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.191"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AIMS.2017.31"},{"key":"ref7","article-title":"Blockchain-based Community Corroboration for Zero Trust Architectures and Systems","volume-title":"Proc. Zero Trust Hardware Architectures Workshop (ZTHA)","author":"Chen","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100767"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3408292"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6225"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3201772"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00022"},{"key":"ref16","article-title":"Bot Identity, Identification and Threat Models","volume-title":"Proc. 12th Int. Conf. on Smart Media & Applications (SMA2023)","author":"Chen","year":"2023"},{"key":"ref17","article-title":"Identifying the Invisible: A Comprehensive Approach to Distinguishing Software Bots","volume-title":"Proc. IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications","author":"Chen","year":"2024"},{"key":"ref18","first-page":"53","article-title":"Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots","volume-title":"Proc. 31st USENIX Security Symposium (Security 2022)","author":"Kondracki","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.51685\/jqd.2024.icwsm.7"},{"key":"ref20","article-title":"Decentralized Identifiers (DIDs)","volume-title":"W3C Recommendation","year":"2023"},{"key":"ref21","article-title":"Verifiable Credentials Data Model v1.1","volume-title":"W3C Recommendation","year":"2023"},{"key":"ref22","article-title":"A Novel Zero-Trust Identity Framework for Agentic AI: Decentralized Authentication and Fine-Grained Access Control","author":"Huang","year":"2025","journal-title":"arXiv preprint"},{"key":"ref23","article-title":"A Vision for Access Control in LLM-Based Agent Systems","author":"Li","year":"2025","journal-title":"arXiv preprint"},{"key":"ref24","article-title":"OWASP Top 10 for LLM Applications 2025: Top 10 Risks and Mitigations for LLMs and GenAI Apps","volume-title":"OWASP","year":"2025"},{"key":"ref25","article-title":"Attention Is All You Need","author":"Vaswani","year":"2017","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"ref26","article-title":"LLaMA: Open and Efficient Foundation Language Models","author":"Touvron","year":"2023","journal-title":"arXiv preprint"},{"key":"ref27","article-title":"A Survey of Large Language Models","author":"Zhao","year":"2023","journal-title":"arXiv preprint"},{"key":"ref28","article-title":"The2025 Guide to AI Agents","volume-title":"IBM Think","year":"2025"},{"key":"ref29","article-title":"The Landscape of Emerging AI Agent Architectures for Reasoning, Planning, and Tool Calling: A Survey","author":"Masterman","year":"2024","journal-title":"arXiv preprint"},{"key":"ref30","article-title":"Sentinel Agents for Secure and Trustworthy Agentic AI in Multi-Agent Systems","author":"Gosmar","year":"2025","journal-title":"arXiv"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401974.pdf?arnumber=11401974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:19:25Z","timestamp":1772867965000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401974","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}