{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:23:30Z","timestamp":1730287410539,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T00:00:00Z","timestamp":1669334400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T00:00:00Z","timestamp":1669334400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,25]]},"DOI":"10.1109\/paap56126.2022.10010593","type":"proceedings-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T22:23:54Z","timestamp":1673475834000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Comparative Study on Data Sovereignty Guarantee Technology"],"prefix":"10.1109","author":[{"given":"Yaodong","family":"Tao","sequence":"first","affiliation":[{"name":"Shenyang Ligong University, School of Information Science and Engineering, Beijing Jiaotong University,Industrial Internet Security Research Center\/Director,Beijing,China"}]},{"given":"Shuai","family":"Yang","sequence":"additional","affiliation":[{"name":"Shenyang Ligong University,School of Information Science and Engineering,Shenyang,China"}]},{"given":"Hongmei","family":"Ge","sequence":"additional","affiliation":[{"name":"Xingyuan Certification Center Co., Ltd,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"IDS Reference Architecture Model Version 3.0","volume-title":"Technical Report","author":"Otto","year":"2019"},{"issue":"6","key":"ref2","first-page":"63","article-title":"Problems and reflections on the development of value of data elements","volume":"47","author":"Ke","year":"2021","journal-title":"Information and Communications Technology and Policy"},{"key":"ref3","article-title":"IDS Reference Architecture Model","volume-title":"Technical Report","author":"Otto","year":"2017"},{"volume-title":"IDS Reference Architecture Model Version 4.0","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00609-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-27716-1_4"},{"key":"ref8","first-page":"17","article-title":"Usage Control: A Vision for Next Generation Access Control. In Computer Network Security","volume-title":"Proceedings of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003","author":"Sandhu","year":"2003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2010.02.002"},{"key":"ref11","first-page":"202","article-title":"Usage control in cloud systems","volume-title":"Proceedings of the 2012 International Conference for Internet Technology and Secured Transactions","author":"Lazouski"},{"volume-title":"CIOF System Configuration","key":"ref12"},{"volume-title":"Trusted Industrial Data Matrix 1.0","key":"ref13"},{"volume-title":"Usage Control in the International Data Spaces","year":"2021","author":"Steinbuss","key":"ref14"},{"article-title":"Usage Control Specification, Enforcement, and Robustness: A Survey","year":"2022","author":"AKAICHI","key":"ref15"},{"volume-title":"How to build yourself data usage control policy","key":"ref16"},{"volume-title":"Privacy-Preserving Computing","year":"2022","author":"Kai","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124890"},{"volume-title":"The documentation of DataTrust Product","key":"ref19"},{"volume-title":"Hype Cycle for Privacy","year":"2021","author":"Willemsen","key":"ref20"}],"event":{"name":"2022 IEEE 13th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)","start":{"date-parts":[[2022,11,25]]},"location":"Beijing, China","end":{"date-parts":[[2022,11,27]]}},"container-title":["2022 IEEE 13th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10009901\/10009922\/10010593.pdf?arnumber=10010593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T07:33:24Z","timestamp":1707464004000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10010593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,25]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/paap56126.2022.10010593","relation":{},"subject":[],"published":{"date-parts":[[2022,11,25]]}}}