{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:41:12Z","timestamp":1758894072943},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/vtcfall.2015.7391174","type":"proceedings-article","created":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T16:40:58Z","timestamp":1453999258000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["Three-Layers Secure Access Control for Cloud-Based Smart Grids"],"prefix":"10.1109","author":[{"given":"Yuanpeng","family":"Xie","sequence":"first","affiliation":[]},{"given":"Hong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Jinsong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yixin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jiaxiao","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Xiaobin","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Aidong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zewu","family":"Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1900008.1900152"},{"key":"ref12","first-page":"383","article-title":"The security issue of WSNs based on cloud computing[C]\/\/Communications and Network Security (CNS)","author":"xie","year":"2013","journal-title":"2013 IEEE Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2050377"},{"article-title":"Above the clouds: a Berkeley view of cloud computing","year":"2009","author":"armbrust","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.52"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2053726"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.107"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/UPEC.2014.6934607"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","article-title":"Hierarchical ID-based cryptography","author":"gentry","year":"2002","journal-title":"Proceedings of Advances in cryptoiogy-ASIACRYPT 2002 Springer Berlin Heidelberg"}],"event":{"name":"2015 IEEE 82nd Vehicular Technology Conference (VTC Fall)","start":{"date-parts":[[2015,9,6]]},"location":"Boston, MA, USA","end":{"date-parts":[[2015,9,9]]}},"container-title":["2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7389774\/7390768\/07391174.pdf?arnumber=7391174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:45:02Z","timestamp":1498265102000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7391174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/vtcfall.2015.7391174","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}