{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:47:59Z","timestamp":1758980879118,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,1]]},"DOI":"10.1109\/medcomnet55087.2022.9810394","type":"proceedings-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T19:38:27Z","timestamp":1656704307000},"page":"122-130","source":"Crossref","is-referenced-by-count":2,"title":["Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption"],"prefix":"10.1109","author":[{"given":"Ingrid","family":"Huso","sequence":"first","affiliation":[{"name":"Politecnico di Bari,Dept. of Electrical and Information Engineering,Bari,Italy"}]},{"given":"Giuseppe","family":"Piro","sequence":"additional","affiliation":[{"name":"Politecnico di Bari,Dept. of Electrical and Information Engineering,Bari,Italy"}]},{"given":"Gennaro","family":"Boggia","sequence":"additional","affiliation":[{"name":"Politecnico di Bari,Dept. of Electrical and Information Engineering,Bari,Italy"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3134015"},{"key":"ref31","first-page":"100294","article-title":"A comprehensive study on current and future trends towards the characteristics and enablers of industry 4.0","author":"karnik","year":"2021","journal-title":"Journal of Industrial Information Integration"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779124"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500525"},{"journal-title":"Multi-access Edge Computing (MEC) Framework and Reference Architecture","year":"2019","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2823309"},{"key":"ref10","article-title":"Time-controlled hierarchical multi-keyword search over encrypted data in cloud-assisted iot","author":"liu","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2921113"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962600"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2022.3143661"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s21155189"},{"journal-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations","year":"2014","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2012.106"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2877146"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3014168"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2520932"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s22030927"},{"key":"ref6","article-title":"Recent technologies, security countermeasure and ongoing challenges of industrial internet of things (iiot): A survey","volume":"21","author":"soo fun","year":"2021","journal-title":"SENSORS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917772"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.21261"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04309-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1019767"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3066427"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2916569"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.215"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2510822"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2481389"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2018.2830368"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.09.029"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2442215"}],"event":{"name":"2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)","start":{"date-parts":[[2022,6,1]]},"location":"Pafos, Cyprus","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810329\/9810360\/09810394.pdf?arnumber=9810394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:21:00Z","timestamp":1658780460000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9810394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/medcomnet55087.2022.9810394","relation":{},"subject":[],"published":{"date-parts":[[2022,6,1]]}}}