{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:08:20Z","timestamp":1771024100741,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"20","license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332007"],"award-info":[{"award-number":["62332007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302192"],"award-info":[{"award-number":["62302192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2028"],"award-info":[{"award-number":["U22B2028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20303"],"award-info":[{"award-number":["U23A20303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Major Project of Tibetan Autonomous Region of China","award":["XZ202201ZD0006G"],"award-info":[{"award-number":["XZ202201ZD0006G"]}]},{"name":"Open Research Fund of Machine Learning and Cyber Security Interdiscipline Research Engineering Center of Jiangsu Province","award":["SDGC2131"],"award-info":[{"award-number":["SDGC2131"]}]},{"name":"National Joint Engineering Research Center of Network Security Detection and Protection Technology"},{"name":"Guangdong Key Laboratory of Data Security and Privacy Preserving"},{"name":"Guangdong Hong Kong Joint Laboratory for Data Security and Privacy Protection"},{"name":"Engineering Research Center of Trustworthy AI, Ministry of Education; in part by GuangDong Basic and Applied Basic Research Foundation","award":["2024A1515011341"],"award-info":[{"award-number":["2024A1515011341"]}]},{"name":"Dongguan Social Development Technology Project","award":["20231800940342"],"award-info":[{"award-number":["20231800940342"]}]},{"name":"Guangdong Natural Science Foundation General Project","award":["2024A1515010086"],"award-info":[{"award-number":["2024A1515010086"]}]},{"name":"China Postdoctoral Science Foundation 17th Batch Special Funding Project","award":["2024T170348"],"award-info":[{"award-number":["2024T170348"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,10,15]]},"DOI":"10.1109\/jiot.2025.3595191","type":"journal-article","created":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:46:34Z","timestamp":1754333194000},"page":"43181-43194","source":"Crossref","is-referenced-by-count":1,"title":["Efficient and Verifiable Bilateral Fine-Grained Access Control for Cloud\u2013Edge IoT Healthcare"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6689-827X","authenticated-orcid":false,"given":"Mengting","family":"Yao","sequence":"first","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6600-3225","authenticated-orcid":false,"given":"Junjie","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3140-2320","authenticated-orcid":false,"given":"Jia-Nan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7416-7223","authenticated-orcid":false,"given":"Hongkai","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5876-7875","authenticated-orcid":false,"given":"Jiasi","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-2177","authenticated-orcid":false,"given":"Zhiquan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2936481"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3279893"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819511-6.00006-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3109090"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3027579"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103749"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.imu.2024.101552"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3366611"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3277702"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025060"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.204"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00139"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0272-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2012.68"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.06.018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_30"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3001557"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3133345"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288380"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31919-9_22"},{"key":"ref27","first-page":"34","article-title":"Outsourcing the decryption of ABE ciphertexts","volume-title":"Proc. 20th USENIX Security Symp. (USENIX Secur.)","author":"Green"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.028"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31448-3_25"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.11.037"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1867584"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41227-1_17"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3331566"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0289-6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_24"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92518-5_19"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22969-5_14"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-45513-1_14"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102950"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3310663"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3516568"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3308261"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2992288"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11197149\/11111681.pdf?arnumber=11111681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:55:51Z","timestamp":1760032551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11111681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":46,"journal-issue":{"issue":"20"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3595191","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]}}}