{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:59:45Z","timestamp":1770541185876,"version":"3.49.0"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022YFB2701400"],"award-info":[{"award-number":["2022YFB2701400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076125"],"award-info":[{"award-number":["62076125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032025"],"award-info":[{"award-number":["62032025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20467"],"award-info":[{"award-number":["U21A20467"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20176"],"award-info":[{"award-number":["U20A20176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2029"],"award-info":[{"award-number":["U22B2029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002047"],"award-info":[{"award-number":["62002047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132008"],"award-info":[{"award-number":["62132008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2030"],"award-info":[{"award-number":["U22B2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Science and Technology Program","award":["JCYJ20210324134810028"],"award-info":[{"award-number":["JCYJ20210324134810028"]}]},{"name":"Shenzhen Science and Technology Program","award":["JCYJ20210324134408023"],"award-info":[{"award-number":["JCYJ20210324134408023"]}]},{"name":"Natural Science Foundation of Jiangsu Province, China","award":["BK20220075"],"award-info":[{"award-number":["BK20220075"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tsc.2024.3495498","type":"journal-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T18:41:46Z","timestamp":1731350506000},"page":"43-56","source":"Crossref","is-referenced-by-count":5,"title":["ADSS: An Available-but-Invisible Data Service Scheme for Fine-Grained Usage Control"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2170-2349","authenticated-orcid":false,"given":"Hao","family":"Wang","sequence":"first","affiliation":[{"name":"Department of College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0481-5341","authenticated-orcid":false,"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9274-7325","authenticated-orcid":false,"given":"Chunpeng","family":"Ge","sequence":"additional","affiliation":[{"name":"Joint SDU-NTU Centre for Artificial Intelligence Research (C-FAIR), the Software School, Shandong University and Quan Cheng Laboratory, Jinan, China"}]},{"given":"Yuhang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6240-6688","authenticated-orcid":false,"given":"Lu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of of College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics and the Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8578-2635","authenticated-orcid":false,"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang Laboratory, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4817-2744","authenticated-orcid":false,"given":"Weibin","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0691-2724","authenticated-orcid":false,"given":"Mingsheng","family":"Cao","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996664"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3076759"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3265932"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101854"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3203577"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3114719"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3190932"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2449264"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2899300"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2410137"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2347673.2347681"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131697"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.032"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3040171"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3123312"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref21","first-page":"2261","article-title":"ReZone: Disarming TrustZone with TEE privilege reduction","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Cerdeira"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref24","first-page":"1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Satoshi Nakamoto"},{"issue":"37","key":"ref25","first-page":"2","article-title":"A next-generation smart contract and decentralized application platform","volume":"3","author":"Buterin","year":"2014","journal-title":"White Paper"},{"key":"ref26","article-title":"Why many smart contract use cases are simply impossible","volume-title":"Coindesk","author":"Greenspan","year":"2016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_37"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23118"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3294019"},{"key":"ref31","first-page":"451","article-title":"HybCache: Hybrid side-channel-resilient caches for trusted execution environments","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Dessouky"},{"key":"ref32","first-page":"788","article-title":"DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization","volume-title":"Proc. 35th Annu. Comput. Secur. Appl. Conf.","author":"Brasser"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.03.004"},{"key":"ref34","article-title":"Integrating remote attestation with transport layer security","author":"Knauth","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623134"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2022.3180932"},{"key":"ref37","article-title":"Outsourcing the decryption of ABE ciphertexts","volume-title":"Proc. USENIX Secur. Symp.","author":"Green"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2001.962837"},{"key":"ref39","first-page":"1","article-title":"The RSA algorithm","author":"Milanov","year":"2009","journal-title":"RSA Lab."},{"key":"ref42","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3295763"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.01.147"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.10.016"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/10878318\/10749975.pdf?arnumber=10749975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T03:45:45Z","timestamp":1739245545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10749975\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":42,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2024.3495498","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}