{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:56:06Z","timestamp":1772063766323,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/tetc.2015.2502429","type":"journal-article","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T14:38:08Z","timestamp":1448375888000},"page":"301-315","source":"Crossref","is-referenced-by-count":21,"title":["SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2463-8477","authenticated-orcid":false,"given":"Danan","family":"Thilakanathan","sequence":"first","affiliation":[]},{"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Calvo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.84"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.39"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943540"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588602"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866359"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2013.125"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.028"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-008-0005-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014715"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.93"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70013-2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NCIS.2011.27"},{"key":"ref17","first-page":"1","article-title":"Privacy and security issues in cloud computing","author":"bender","year":"2012","journal-title":"Computer and Internet Lawyer"},{"key":"ref18","first-page":"103","article-title":"A secure public cloud storage system","author":"shin","year":"2011","journal-title":"Proc Int Conf Internet Technol Secured Trans (ICITST)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2010.19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435401"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2011.553149"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_8"},{"key":"ref3","first-page":"42","article-title":"Sharing digital data","volume":"48","author":"benedis-grab","year":"2011","journal-title":"Science and Children"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/07419051011083181"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382201"},{"key":"ref5","author":"fienberg","year":"1985","journal-title":"Sharing Research Data"},{"key":"ref8","first-page":"95","article-title":"Between iPhone and YouTube: Movies on the move","author":"simons","year":"2011","journal-title":"Proc FGw Amsterdam School Cultural Anal (ASCA)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1356"},{"key":"ref2","author":"gellin","year":"2012","journal-title":"Facebook's Benefits Make It Worthwhile"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"ref1","first-page":"45","article-title":"Secure data sharing in the cloud","author":"thilakanathan","year":"2013","journal-title":"Security Privacy and Trust in Cloud Systems"},{"key":"ref20","author":"andy","year":"2007","journal-title":"Salesforce com Scrambles To Halt Phishing Attacks"},{"key":"ref22","author":"whitney","year":"2011"},{"key":"ref21","author":"charles","year":"2011"},{"key":"ref24","first-page":"17","article-title":"Implementing a portable trusted environment","author":"zic","year":"2008","journal-title":"Proceedings of Future of Trust in Computing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2011-75"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76848-7_17"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/7484805\/07336564.pdf?arnumber=7336564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:44:29Z","timestamp":1641987869000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7336564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":40,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2015.2502429","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}