{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:00:50Z","timestamp":1758265250921,"version":"3.37.3"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Jilin Science Technology Development","award":["20140520074JH"],"award-info":[{"award-number":["20140520074JH"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2022,2,1]]},"DOI":"10.1109\/tbdata.2017.2705418","type":"journal-article","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T18:38:00Z","timestamp":1495132680000},"page":"35-47","source":"Crossref","is-referenced-by-count":15,"title":["Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud\/Fog Computing"],"prefix":"10.1109","volume":"8","author":[{"given":"Ziyi","family":"Su","sequence":"first","affiliation":[]},{"given":"Frederique","family":"Biennier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2525-3074","authenticated-orcid":false,"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]},{"given":"Jingwei","family":"Miao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1349026.1349043"},{"issue":"3","key":"ref2","first-page":"311","article-title":"Managing collaboration performance to govern virtual organizations","volume-title":"J. Intell. Manuf.","volume":"21","author":"Westphal","year":"2008"},{"issue":"2","key":"ref3","first-page":"618","article-title":"A survey of trust and reputation systems for online service provision","volume-title":"Decision Support Syst.","volume":"43","author":"Josang","year":"2006"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/352600.352620"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.3233\/JCS-2002-10303"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/352600.352633"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/501983.502004"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/605434.605435"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/1377836.1377849"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2002259.2002283"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ENABL.2004.4"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1455770.1455794"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1121995.1122001"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/1609956.1609962"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MSP.2010.89"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/POLICY.2008.17"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1179601.1179609"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1391956.1391957"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1413140.1413173"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/11961635_7"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.future.2015.09.021"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.jnca.2015.12.016"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.comcom.2016.03.015"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TSC.2016.2528246"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1201\/b19206-20"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/MCOM.2016.7452265"},{"key":"ref28","first-page":"1","article-title":"P-SEP: A prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks","volume-title":"J. Supercomputing","author":"Naranjo","year":"2016"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TCC.2016.2551747"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/MNET.2016.7437025"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/CHASE.2016.40"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.pmcj.2014.11.005"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.procs.2015.07.251"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.bushor.2015.03.008"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.jfoodeng.2015.11.009"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.autcon.2015.10.009"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.inffus.2014.01.001"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TITS.2015.2494017"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ACCESS.2016.2519820"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1016\/j.comcom.2016.03.007"},{"issue":"7","key":"ref41","article-title":"Massive access control aided by knowledge-extraction for co-existing periodic and random services over wireless clinical networks","volume-title":"J. Med. Syst.","volume":"40","author":"Du","year":"2016"},{"key":"ref42","article-title":"Multimedia recommendation and transmission system based on cloud platform","volume-title":"Future Generation Comput. Syst.","author":"Yang","year":"2016"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1016\/j.clsr.2015.07.002"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/j.future.2015.09.016"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1016\/j.bushor.2015.06.005"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1016\/j.future.2016.02.020"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1007\/s10796-014-9538-x"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.5220\/0004401900170024"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/POLICY.2005.25"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1080\/10919399409540214"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1007\/s10207-010-0106-1"},{"author":"Sinnema","article-title":"XML and security: Real world examples of XACML security policies","key":"ref52"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/9680325\/07931685.pdf?arnumber=7931685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T05:42:26Z","timestamp":1709271746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7931685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,1]]},"references-count":51,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2017.2705418","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"type":"electronic","value":"2332-7790"},{"type":"electronic","value":"2372-2096"}],"subject":[],"published":{"date-parts":[[2022,2,1]]}}}