{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:48:57Z","timestamp":1771634937836,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1109\/mnet.011.2000666","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T15:29:40Z","timestamp":1613662180000},"page":"8-15","source":"Crossref","is-referenced-by-count":51,"title":["Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation"],"prefix":"10.1109","volume":"35","author":[{"given":"Xuemin Sherman","family":"Shen","sequence":"first","affiliation":[]},{"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Dongxiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Weihua","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Bidi","family":"Ying","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"445","article-title":"Research Directions in Blockchain Data Management and Analytics","author":"vo","year":"0","journal-title":"Proc EDBT"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2953082"},{"key":"ref32","first-page":"851","article-title":"Ghostor: Toward a Secure Datasharing System from Decentralized Trust","author":"hu","year":"0","journal-title":"Proc NSDI"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14778\/3055540.3055542"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2861765"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00028"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155414"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref34","volume":"20","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"ref40","article-title":"BPDIMS: A Blockchain-Based Personal Data and Identity Management System","author":"faber","year":"0","journal-title":"Proc HICSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"ref12","article-title":"A Blockchain Framework for Managing and Monitoring Data in Multi-Site Clinical Trials","author":"choudhury","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref13","first-page":"2013","article-title":"A Blockchain-Based Trusted Data Management Scheme in Edge Computing","volume":"16","author":"ma","year":"2019","journal-title":"IEEE Trans Industrial Informatics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339820"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00039"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988481"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2162864"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2870167"},{"key":"ref19","first-page":"301","article-title":"Accumulators with Applications to Ano-nymity-Preserving Revocation","author":"baldimtsi","year":"0","journal-title":"Proc EuroS&P"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2908400"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800718"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2851256"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-020-01646-9"},{"key":"ref6","first-page":"2075","article-title":"Tracking GDPR Compliance in Cloud-Based Service Delivery","author":"barati","year":"2020","journal-title":"IEEE Trans Services Computing Early Access"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2877790"},{"key":"ref5","year":"0"},{"key":"ref8","article-title":"The Nebulastream Platform: Data and Application Management for the Internet of Things","author":"zeuch","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2934664"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800376"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2020.2965100"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"ref22","first-page":"1106","article-title":"Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps","author":"zhao","year":"0","journal-title":"Proc IEEE S&P"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101653"},{"key":"ref24","first-page":"168","article-title":"Breaking and (Partial-ly) Fixing Provably Secure Onion Routing","author":"kuhn","year":"0","journal-title":"Proc IEEE S&P"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948287"},{"key":"ref23","first-page":"1519","article-title":"fJEDlg: Many-to-Many End-to-End Encryption and Key Delegation for IoT","author":"kumar","year":"0","journal-title":"Proc Usenix Security"},{"key":"ref26","first-page":"792","article-title":"Searching an Encrypted Cloud Meets Block-chain: A Decentralized, Reliable and Fair Realization","author":"hu","year":"0","journal-title":"Proc IEEE InfoCom"},{"key":"ref43","first-page":"185","article-title":"Ekiden: A Platform for Confidentialitypre-serving, Trustworthy, and Performant Smart Contracts","author":"cheng","year":"0","journal-title":"Proc IEEE EuroS&P"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357975"}],"container-title":["IEEE Network"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/65\/9354913\/09355048.pdf?arnumber=9355048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:50:29Z","timestamp":1652194229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9355048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":43,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mnet.011.2000666","relation":{},"ISSN":["0890-8044","1558-156X"],"issn-type":[{"value":"0890-8044","type":"print"},{"value":"1558-156X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]}}}