{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:16:26Z","timestamp":1730268986506,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/iotsms52051.2020.9340164","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T07:28:03Z","timestamp":1612337283000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Approach Based on Blockchain to Enhance Security with Dynamic Policy Updating"],"prefix":"10.1109","author":[{"given":"Oussama","family":"Mounnan","sequence":"first","affiliation":[]},{"given":"Abdelkrim","family":"El Mouatasim","sequence":"additional","affiliation":[]},{"given":"Otman","family":"Manad","sequence":"additional","affiliation":[]},{"given":"Aissam","family":"Outchakoucht","sequence":"additional","affiliation":[]},{"given":"Hamza","family":"Es-samaali","sequence":"additional","affiliation":[]},{"given":"Larbi","family":"Boubchir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195408"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"ref12","article-title":"Special issue on Security, Privacy and Trust in network-based Big Data","author":"hua","year":"2015","journal-title":"Information SciencesInformatics and Computer Science Intelligent Systems Applications An International Journal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2846037"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2667679"},{"key":"ref16","article-title":"Attribute-Based Publishing with Hidden Credentials and Hidden Policies","author":"kapadia","year":"2007","journal-title":"14th Annual Network and Distributed System Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"journal-title":"Proc ACM Symp on Access Control Models and Technologies","article-title":"A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records","year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_751"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035221"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1982-0643742-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2018.00120"},{"key":"ref6","article-title":"Access control scheme to big data using privacy preserving policy","volume":"8","author":"sriraksha","year":"2018","journal-title":"International Journal of Development Research"},{"key":"ref29","first-page":"53","article-title":"Efficient Distributed Access Control Using Blockchain for Big Data in Clouds","author":"mounnan","year":"2019","journal-title":"The Fifteenth International Conference on Wireless and Mobile Communications ICWMC&#x2019;19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app8101836"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2380373"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848142"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2017.8071359"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5428-1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipv028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00918-1"},{"key":"ref22","article-title":"Conceptualizing Blockchains: Characteristics & Applications","author":"sultan","year":"2018","journal-title":"11th IADIS International Conference Information Systems 2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2542813"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100198"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"ref26","article-title":"Attribute-Based Encryption withNon-Monotonic Access Structures","author":"ostrovsky","year":"2007","journal-title":"14th ACM Conference on Computer and Communications Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_2"}],"event":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","start":{"date-parts":[[2020,12,14]]},"location":"Paris, France","end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9340169\/9340158\/09340164.pdf?arnumber=9340164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:57:33Z","timestamp":1656453453000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9340164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iotsms52051.2020.9340164","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}