{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:57:30Z","timestamp":1729637850988,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icinfa.2017.8079082","type":"proceedings-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T21:59:29Z","timestamp":1509055169000},"page":"1190-1195","source":"Crossref","is-referenced-by-count":4,"title":["XACML policy evaluation optimization research based on attribute weighted clustering and statistics reordering"],"prefix":"10.1109","author":[{"given":"Pan Jun","family":"Sun","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1384529.1375488"},{"key":"ref11","first-page":"1802","article-title":"Designing fast and scalable XACML policy evaluation engines. Computers","volume":"60","author":"liu","year":"2012","journal-title":"IEEE Transactions on"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.28"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1370905.1370906"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128867"},{"key":"ref16","first-page":"1","article-title":"Adaptive Statistical Optimization Techniques for Firewall Packet Filtering","author":"famed","year":"2006","journal-title":"Proc 25th IEEE IN FOCOM"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1140103.1140313"},{"key":"ref18","article-title":"M. K.Ng.Automated variable weighting in k-means type clustering","author":"huang","year":"0","journal-title":"IEEE International Conference on Data Mining"},{"journal-title":"XACML2 0conferencetest[OL]","year":"0","key":"ref19"},{"key":"ref4","first-page":"279","article-title":"Enforcing Privacy by Means of an Ontology Driven XACML Framework","author":"diehn","year":"2007","journal-title":"Proc Third Int'l Symp Information Assurance and Security (IAS '07)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/1375457.1375488","article-title":"XEngine:A Fast and Scalable XCML Policy Evaluation Engine","author":"liu","year":"2008","journal-title":"Proc of the ACM SIGMETRICS Conf on the Measurement and Modeling of Computer Systems"},{"key":"ref6","first-page":"196","article-title":"Verification and change impact analysis of access-control policies","author":"fisler","year":"2005","journal-title":"Proceedings of the 27th International Conference on Software Engineering ICSE 05"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007631"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242664"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1187441.1187442"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266842"},{"key":"ref1","article-title":"XACML Policy Integration Algorithms","volume":"11","author":"mussolini","year":"2008","journal-title":"ACM Trans Information and System Security"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1377836.1377867","author":"hu","year":"2008","journal-title":"Enabling verification and conformance testing for access control model In Proceeding-gs of the 13th ACM symposium on Access control models and technologies"},{"key":"ref20","first-page":"63","volume":"19","author":"rivest","year":"1976","journal-title":"On Self-Organizing Sequential Search Heuristics ACM"}],"event":{"name":"2017 IEEE International Conference on Information and Automation (ICIA)","start":{"date-parts":[[2017,7,18]]},"location":"Macau SAR, China","end":{"date-parts":[[2017,7,20]]}},"container-title":["2017 IEEE International Conference on Information and Automation (ICIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055743\/8078872\/08079082.pdf?arnumber=8079082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,27]],"date-time":"2023-08-27T17:06:51Z","timestamp":1693156011000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8079082\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icinfa.2017.8079082","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}