{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:10:28Z","timestamp":1775229028011,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,8]]},"DOI":"10.1109\/icc52391.2025.11161387","type":"proceedings-article","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T17:34:55Z","timestamp":1758908095000},"page":"2623-2628","source":"Crossref","is-referenced-by-count":1,"title":["Path-Aware Access Control: Granting Access with Transit Network Attributes"],"prefix":"10.1109","author":[{"given":"Jonghoon","family":"Kwon","sequence":"first","affiliation":[{"name":"ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland"}]},{"given":"Julian","family":"Modanese","sequence":"additional","affiliation":[{"name":"ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland"}]},{"given":"Jordi Subir\u00e0","family":"Nieto","sequence":"additional","affiliation":[{"name":"ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Casbin Go package"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363197"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00122"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_13"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05288-0"},{"key":"ref7","article-title":"The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources","author":"Dai","year":"2021","journal-title":"USENIX Security"},{"key":"ref8","article-title":"Segment Routing Architecture","author":"Filsfils","year":"2018","journal-title":"RFC 8402"},{"key":"ref9","volume-title":"Path Metadata in Beacons","author":"Frei","year":"2021"},{"issue":"162","key":"ref10","first-page":"1","article-title":"Guide to Attribute-Based Access Control (ABAC) Sefinition and Considerations","volume":"800","author":"Hu","year":"2013","journal-title":"NIST special publication"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21236\/ada385578"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626323"},{"key":"ref14","article-title":"FABRID: Flexible Attestation-Based Routing for InterDomain Networks","author":"Kr\u00e4henb\u00fchl","year":"2023","journal-title":"USENIX Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8986"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431310"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/mwscas.2002.1187027"},{"key":"ref18","article-title":"EPIC: Every Packet is Checked in the Data Plane of a Path-aware Internet","author":"Legner","year":"2020","journal-title":"USENIX Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.47"},{"key":"ref20","volume-title":"PAAC Codebase","author":"Modanese","year":"2024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079326"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00062"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3532105.3535036"},{"issue":"22","key":"ref25","volume-title":"eXtensible Access Control Markup Language (XACML) Version 3.0","volume":"A","author":"Standard","year":"2013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1024853.1024855"},{"key":"ref27","article-title":"Blind In\/On-Path Attacks and Applications to VPNs","author":"Tolley","year":"2021","journal-title":"USENIX Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021673"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8663"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2440242"}],"event":{"name":"ICC 2025 - IEEE International Conference on Communications","location":"Montreal, QC, Canada","start":{"date-parts":[[2025,6,8]]},"end":{"date-parts":[[2025,6,12]]}},"container-title":["ICC 2025 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11160703\/11160705\/11161387.pdf?arnumber=11161387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T14:47:50Z","timestamp":1759243670000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11161387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icc52391.2025.11161387","relation":{},"subject":[],"published":{"date-parts":[[2025,6,8]]}}}