{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:08:41Z","timestamp":1729609721006,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/icsrs.2017.8272852","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T16:45:14Z","timestamp":1517503514000},"page":"380-385","source":"Crossref","is-referenced-by-count":1,"title":["Improvement of ACL assembly algorithm"],"prefix":"10.1109","author":[{"given":"Chen","family":"Xue","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Zhonghua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"24","article-title":"Application of Access Control List in Network Security [J]","author":"gao","year":"2014","journal-title":"Computer Knowledge and Technology"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/65.912717"},{"key":"ref12","first-page":"21","article-title":"Poonam-Access Control List Implementation in a Private Network[J]","volume":"98","author":"kaushik","year":"2016","journal-title":"IEICE Technical Report Education Technology"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/316188.316216"},{"key":"ref14","first-page":"1145","article-title":"Optimization of access control list based on locator\/identifier split[J]","volume":"27","author":"yufeng","year":"2010","journal-title":"Application Research of Computers"},{"key":"ref15","article-title":"The Application of Access Control List in the Campus Network Security[J]","author":"tao","year":"2011","journal-title":"Computer Knowledge and Technology"},{"key":"ref16","article-title":"The Application of Access Control List in the Campus Network Security[J]","author":"tao","year":"2011","journal-title":"Computer Knowledge and Technology"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/316194.316217"},{"key":"ref3","first-page":"89","article-title":"Research on Technique to Control Access to Network Layer Based on ACL[J]","volume":"21","author":"fan","year":"2004","journal-title":"Journal of East China Jiaotong University"},{"key":"ref6","first-page":"2965","article-title":"The Application of ACL in Campus Network[J]","volume":"4","author":"wei","year":"2008","journal-title":"Computer Knowledge and Technology"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/INFCOM.2000.832496"},{"key":"ref8","first-page":"133","article-title":"Implement on Dynamic ACL in Enterprise Network[J]","volume":"30","author":"li","year":"2011","journal-title":"Computing Technology and Automation"},{"key":"ref7","first-page":"8376","article-title":"The Application of ACL in Campus Network[J]","volume":"6","author":"shen","year":"2010","journal-title":"Computer Knowledge and Technology"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/65.993221"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/65.993219"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"978","DOI":"10.1360\/jos180978","article-title":"Towards the Optimization of Access Control List[J]","volume":"18","author":"kuang yi","year":"2007","journal-title":"Journal of Software"}],"event":{"name":"2017 2nd International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2017,12,20]]},"location":"Milan","end":{"date-parts":[[2017,12,22]]}},"container-title":["2017 2nd International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8264984\/8272780\/08272852.pdf?arnumber=8272852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T00:45:07Z","timestamp":1570668307000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8272852\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icsrs.2017.8272852","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}