{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:37:08Z","timestamp":1767109028973,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/globecom46510.2021.9685619","type":"proceedings-article","created":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T21:59:04Z","timestamp":1643839144000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["A Dynamic Access Control Model Based on Game Theory for the Cloud"],"prefix":"10.1109","author":[{"given":"Pengfei","family":"Shao","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China"}]},{"given":"Shuyuan","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCA.2011.6106526"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITAIC.2011.6030345"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2677855.2677884"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6827577"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2016.7554170"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvjsf522"},{"key":"ref16","volume":"3","author":"osborne","year":"2004","journal-title":"An Introduction to Game Theory"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.12.001"},{"key":"ref18","article-title":"A trust-game-based access control model for cloud service","volume":"2020","author":"jun","year":"2020","journal-title":"Mobile Information Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2017.03.006"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.94"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-30"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03958"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60206-5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2344653"},{"journal-title":"Secure Computer Systems Mathematical Foundations","year":"1973","author":"bell","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.037"},{"key":"ref7","article-title":"Guide to attribute based access control (abac) definition and considerations (draft)","volume":"800","author":"hu","year":"2013","journal-title":"NIST Special Publication"},{"journal-title":"Security Guidance for Critical Areas of Focus in Cloud Computing","year":"2017","author":"mogull","key":"ref2"},{"key":"ref9","first-page":"216","article-title":"Privacy-aware orla based access control model in the cloud","author":"shao","year":"2020","journal-title":"The 32nd International Conference on Software Engineering and Knowledge Engineering SEKE 2020 KSIR Virtual Conference Center"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7535-4_4"},{"key":"ref20","article-title":"Game theoretical analysis on acceptance of a cloud data access control system based on reputation","author":"gao","year":"2016","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3057268"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1126\/science.1130992"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1515\/9781400884087-007"},{"key":"ref26","first-page":"2502","article-title":"The beta reputation system","volume":"5","author":"josang","year":"0","journal-title":"Proceedings of the 15th Bled Electronic Commerce Conference"},{"key":"ref25","first-page":"291","article-title":"Evidence based trust estimation model for cloud computing services","volume":"20","author":"deshpande","year":"2018","journal-title":"IJ Network Security"}],"event":{"name":"GLOBECOM 2021 - 2021 IEEE Global Communications Conference","start":{"date-parts":[[2021,12,7]]},"location":"Madrid, Spain","end":{"date-parts":[[2021,12,11]]}},"container-title":["2021 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9685019\/9685006\/09685619.pdf?arnumber=9685619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T20:24:34Z","timestamp":1654547074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9685619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/globecom46510.2021.9685619","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}