{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:59:04Z","timestamp":1725494344980},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/lcn.2018.8638228","type":"proceedings-article","created":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T20:55:48Z","timestamp":1549918548000},"page":"208-216","source":"Crossref","is-referenced-by-count":1,"title":["IaaS-Aided Access Control for Information-Centric IoT"],"prefix":"10.1109","author":[{"given":"Giovanna","family":"Carofiglio","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Compagno","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Fabio De","family":"Gaspari","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Muscariello","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755720"},{"journal-title":"Securing Personal Health Records in Cloud Computing Patient-centric and Fine-grained Data Access Control in Multi-owner Settings","year":"2010","author":"li","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"ref14","article-title":"Towards trusted cloud computing","author":"santos","year":"2009","journal-title":"Proceedings of the 2009 Conference on Hot Topics in Cloud Computing"},{"journal-title":"Trusted Platform Module","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516683"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516672"},{"journal-title":"Tracing Traitors","year":"1994","author":"chor","key":"ref18"},{"journal-title":"An Efficient Public Key Traitor Tracing Scheme","year":"1999","author":"boneh","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660144"},{"key":"ref27","article-title":"A public-key traitor tracing scheme with revocation using dynamic shares","author":"tzeng","year":"2001","journal-title":"In Proceedings of Public Key Cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref6","article-title":"White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes","author":"ning","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.58"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24643-5_13"},{"journal-title":"Cisco Global Cloud Index Forecast and Methodology 2015-2020","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/2984356.2984374","article-title":"Onboardicng: A secure protocol for on-boarding iot devices in icn","author":"compagno","year":"2016","journal-title":"Proceedings of ACM Information Centric Networking Conference"},{"journal-title":"Openfog architecture overview","year":"0","key":"ref1"},{"journal-title":"Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys","year":"2006","author":"boneh","key":"ref20"},{"journal-title":"Nest bandwidth usage","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"journal-title":"Extended Proxy-Assisted Approach Achieving Revocable Fine-Grained Encryption of Cloud Data","year":"2015","author":"yang","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2013.103"},{"key":"ref26","article-title":"Accconf: An access control framework for leveraging in-network cached data in the icn-enabled wireless edge","author":"misra","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7157958"}],"event":{"name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2018,10,1]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2018,10,4]]}},"container-title":["2018 IEEE 43rd Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8635823\/8638025\/08638228.pdf?arnumber=8638228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:28:03Z","timestamp":1643243283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8638228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/lcn.2018.8638228","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}