{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:20:07Z","timestamp":1771708807961,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072105"],"award-info":[{"award-number":["62072105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province in China","doi-asserted-by":"publisher","award":["2024J01068"],"award-info":[{"award-number":["2024J01068"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,7,15]]},"DOI":"10.1109\/jiot.2025.3562155","type":"journal-article","created":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T13:38:32Z","timestamp":1744983512000},"page":"27269-27279","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-Enhanced Role-Based Access Control for IoT Systems"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7821-8129","authenticated-orcid":false,"given":"Yawei","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5232-7801","authenticated-orcid":false,"given":"Lanxiang","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5516-6585","authenticated-orcid":false,"given":"Yizhao","family":"Zhu","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2254-1914","authenticated-orcid":false,"given":"Xiangqian","family":"Kong","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer, Jilin Normal University, Siping, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100312"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108040"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.08.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3372518"},{"key":"ref5","first-page":"1802","article-title":"POSTER: Security enhanced administrative role based access control models","volume-title":"Proc. CCS","author":"Pv"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2969326"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07085-3_8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015432"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.061"},{"key":"ref12","article-title":"EBIAC: Efficient biometric identity-based access control for wireless body area networks","volume":"121","author":"Gravett","year":"2021","journal-title":"J. Syst. Archit."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3121678"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2697448"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2963794"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3216297"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3165576"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68388-6_3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102108"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3167842"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3456553"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103759"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3022759"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3295941"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516701"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.084"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3075158"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15979-4_22"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68388-6_16"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0041"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3350029"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3138557"},{"key":"ref35","article-title":"Legendre sequences are pseudorandom under the quadratic-residuosity assumption","author":"Corrigan-Gibbs","year":"2024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11074249\/10970002.pdf?arnumber=10970002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T23:20:49Z","timestamp":1752103249000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10970002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,15]]},"references-count":37,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3562155","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,15]]}}}