{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T02:48:26Z","timestamp":1767408506699,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772270"],"award-info":[{"award-number":["61772270"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602262"],"award-info":[{"award-number":["61602262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/tnsm.2019.2941214","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T20:20:46Z","timestamp":1568406046000},"page":"308-318","source":"Crossref","is-referenced-by-count":32,"title":["SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-6338","authenticated-orcid":false,"given":"Yunfei","family":"Meng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6843-1892","authenticated-orcid":false,"given":"Zhiqiu","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-0019","authenticated-orcid":false,"given":"Guohua","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9273-4428","authenticated-orcid":false,"given":"Changbo","family":"Ke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Dynamic enforcement of security policies in multi-tenant cloud networks","year":"2012","author":"koorevaar","key":"ref39"},{"key":"ref38","first-page":"1","article-title":"Cloudwatcher: Network security monitoring using OpenFlow in dynamic cloud networks","author":"shin","year":"2012","journal-title":"Proc IEEE Int Conf Netw Protocols"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620749"},{"journal-title":"Mininet","year":"2012","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3_5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.09.032"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CIACS.2014.6861329"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.077"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6779061"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.84"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.93"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266848"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2008-0328"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-011-0114-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2004.1357989"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057979"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5978636"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.003"},{"journal-title":"EHR","year":"2011","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526896"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2801227"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2365797"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.016"},{"key":"ref9","first-page":"457","article-title":"Fuzzy identity-based encryption","volume":"3494","author":"sahai","year":"2005","journal-title":"Proc Int Conf Theory Appl Cryptograph Techn"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.036"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1515\/9781400882052"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1737"},{"journal-title":"Nox","year":"2018","key":"ref24"},{"journal-title":"POX","year":"2017","key":"ref23"},{"journal-title":"NSX","year":"2018","key":"ref26"},{"journal-title":"Floodlight","year":"2018","key":"ref25"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9032249\/08836534.pdf?arnumber=8836534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:05:11Z","timestamp":1651079111000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8836534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":39,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2019.2941214","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}