{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:47:33Z","timestamp":1725774453732},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/cns.2014.6997508","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T04:15:04Z","timestamp":1419999304000},"page":"391-399","source":"Crossref","is-referenced-by-count":19,"title":["Attribute-based access control for ICN naming scheme"],"prefix":"10.1109","author":[{"given":"Bing","family":"Li","sequence":"first","affiliation":[]},{"given":"Ashwin","family":"Prabhu Verleker","sequence":"additional","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhijie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ontology Based Attribute Management for Abac","year":"2014","author":"ashwin","key":"19"},{"year":"0","key":"17"},{"key":"18","article-title":"An efficient and anonymous attribute-based group setup scheme","author":"li","year":"2013","journal-title":"Proceedings of Globecom"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.131"},{"journal-title":"OWL Web Ontology Language Reference","year":"2004","author":"bechhofer","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018589"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460900"},{"key":"12","article-title":"Decentralizing attribute-based encryption","author":"lewko","year":"2011","journal-title":"Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographic Techniques Advances in Cryptology"},{"journal-title":"Pbc Library the Pairing-based Cryptography Library","year":"0","author":"lynn","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315302","article-title":"Provably secure ciphertext policy abe","author":"cheung","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1356979"},{"journal-title":"Cisco Visual Networking Index Forecast and Methodology 2012-2017","year":"2013","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2342488.2342501"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-30376-0_1","article-title":"Developing information networking further: From psirp to pursuit","author":"fotiou","year":"2012","journal-title":"Ser Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466661"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.11591\/ijins.v1i2.467"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2342488.2342507"}],"event":{"name":"2014 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2014,10,29]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2014,10,31]]}},"container-title":["2014 IEEE Conference on Communications and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6982337\/6997445\/06997508.pdf?arnumber=6997508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:22:12Z","timestamp":1602688932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6997508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cns.2014.6997508","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}