{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T01:05:46Z","timestamp":1773450346119,"version":"3.50.1"},"reference-count":170,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Portuguese FCT program, Center of Technology and Systems","award":["CTS\/00066"],"award-info":[{"award-number":["CTS\/00066"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3533145","type":"journal-article","created":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T18:46:21Z","timestamp":1737657981000},"page":"17777-17806","source":"Crossref","is-referenced-by-count":16,"title":["A Systematic Review of Access Control Models: Background, Existing Research, and Challenges"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1578-0711","authenticated-orcid":false,"given":"Nastaran","family":"Farhadighalati","sequence":"first","affiliation":[{"name":"NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8595-3713","authenticated-orcid":false,"given":"Luis A.","family":"Estrada-Jimenez","sequence":"additional","affiliation":[{"name":"NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0839-9250","authenticated-orcid":false,"given":"Sanaz","family":"Nikghadam-Hojjati","sequence":"additional","affiliation":[{"name":"NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6348-1847","authenticated-orcid":false,"given":"Jose","family":"Barata","sequence":"additional","affiliation":[{"name":"NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.37134\/jictie.vol8.2.4.2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2013.10845680"},{"key":"ref3","volume-title":"Biggest Gdpr Fines of 2024","author":"de Chazal","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23690-7_5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/183335831504400304"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101693"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1560885"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/IJWIS-04-2023-0072"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2023.100015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5747136"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3533703"},{"key":"ref14","article-title":"Modelling and analysing access control policies in xacml 3.0","author":"Ramli","year":"2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1179\/2047480615z.000000000329"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4300\/JGME-D-22-00480.1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5040\/9798400670206.0005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12385-7_61"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69861-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266769"},{"key":"ref21","first-page":"134","article-title":"Study on view-based security model for database","volume-title":"Proc. Sun Yatsen Univ. Forum","volume":"3","author":"Liang"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21236\/ADA023588"},{"key":"ref24","volume-title":"Access Control Systems: Security, Identity Management and Trust Models","author":"Benantar","year":"2005"},{"key":"ref25","first-page":"46","article-title":"Chinese walls, legal principle and commercial reality in multi-service professional firms","volume":"14","author":"Tomasic","year":"1991","journal-title":"UNSWLJ"},{"key":"ref26","volume-title":"Rule-set-based Access Control","author":"Cruz","year":"2016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300839"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266748"},{"key":"ref30","article-title":"Tie-RBAC: An application of RBAC to social networks","author":"Tapiador","year":"2012","journal-title":"arXiv:1205.5720"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5938152"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03314-9_23"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i4.6.20235"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01214-w"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3423783"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16088-2_10"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICFTIC57696.2022.10075243"},{"issue":"11","key":"ref39","first-page":"4","article-title":"Creating a table of authorization to empower staff","volume":"51","author":"Freed","year":"1997","journal-title":"J. Healthcare Financial Manage. Assoc."},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/19452829.2017.1395396"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_14"},{"key":"ref42","volume-title":"A institute of remote sensing and geographic information system","author":"Lina","year":"2008"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3720"},{"key":"ref44","first-page":"137","article-title":"Access control policies, models, and mechanisms","volume-title":"Proc. Int. School Found. Secur. Anal. Design","author":"De Vimercati"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/ia\/iiz145"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.4108\/eai.24-9-2020.166359"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSST.2014.7029344"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60206-5"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7561-3_8"},{"key":"ref50","first-page":"1120","article-title":"Organizational cryptography for access control","volume":"2018","author":"Gotaishi","year":"2018","journal-title":"Cryptol. ePrint Arch."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431115"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2012.6207715"},{"key":"ref53","article-title":"Integration of task-attribute based access control model for mobile workflow authorization and management","author":"Basnet","year":"2019"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325106"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11193073"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00783-8"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205978"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.5753\/ercemapi.2020.11474"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129509007762"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79276-3_1"},{"key":"ref61","volume-title":"SSL and TLS: Theory and Practice","author":"Oppliger","year":"2023"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-019-0022-z"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109068"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017914870"},{"key":"ref65","first-page":"1","article-title":"Control de acceso a redes inala\u00ec mbricas por medio de protocolos de","volume-title":"Proc. Biblioteca Colloq.","author":"Quiroz"},{"key":"ref66","volume-title":"Keycloak-identity and Access Management for Modern Applications: Harness the Power of Keycloak, OpenID Connect, and OAuth 2.0 Protocols To Secure Applications","author":"Thorgersen","year":"2021"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86165-0_17"},{"key":"ref68","first-page":"1","article-title":"MQTT\u2014Messaging queue telemetry transport IoT based messaging protocol","volume":"2016","author":"Mohanty","year":"2016","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-14842-3_7"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2012.6404488"},{"key":"ref71","article-title":"Access control process for a saas provider","author":"Kazmi","year":"2019"},{"key":"ref72","article-title":"Token based authentication and authorization with zero-knowledge proofs for enhancing Web API security and privacy","author":"Lodder","year":"2023"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1585-7_3"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/s21206832"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3583740.3626821"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/app13021183"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC61953.2024.10603175"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01684-0"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1017\/dsi.2019.169"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2018.8363388"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1177\/0739456X17723971"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2017.06.001"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1136\/BMJ.N71"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-02616-8"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2024.1358184"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3335984"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140584"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700642"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129284"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10729-019-09490-4"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00246-4"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02887-6"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719846050"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006455"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719889330"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923525"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8315614"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3390\/s18103520"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205991"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800288"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.014"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2786247"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2017.8282724"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2016.02.002"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0620-4"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.03.011"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10422-5_46"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8iS9\/53617"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818009"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883989"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051105"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.06.009"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2017.05.029"},{"issue":"2","key":"ref114","first-page":"1","article-title":"New attribute relation-based access control system via hybrid logic","volume":"10","author":"Nazerian","year":"2023","journal-title":"J. Comput. Secur."},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICICN56848.2022.10006520"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1149\/10701.9359ecst"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1282"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2790798.2790811"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00264"},{"key":"ref120","volume-title":"Preserving privacy in cyber-physical-social systems: An anonymity and access control approach","author":"Sharma","year":"2020"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070801"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3046869"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00018"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102444"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720921778"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00015"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2016.7522361"},{"key":"ref128","first-page":"1802","article-title":"POSTER: Security enhanced administrative role based access control models","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Rajkumar"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.328"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13214228"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.103"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755719"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463569"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00015"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25126-9_57"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103371"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP60621.2024.00053"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3617184.3617781"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT56998.2023.10307963"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.48047\/AFJBS.6.12.2024.2650-2658"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0020-9"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/3232829.3232843"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-014-0516-9"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.017"},{"key":"ref145","article-title":"Dynamic access control framework for Internet of Things","author":"Alkhresheh","year":"2019"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.5220\/0006948702610268"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ICNICONSMCL.2006.68"},{"key":"ref148","first-page":"1","article-title":"Service-oriented context-aware application design","volume-title":"Proc. MCMP@ MDM","author":"Chaari"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-21821-1_4"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.5220\/0011819700003405"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2810065"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2016.7905662"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.C0910466"},{"issue":"10","key":"ref154","first-page":"4180","article-title":"A fine-grained access control survey for the secure big data access","volume":"12","author":"Odugu","year":"2021","journal-title":"Turkish J. Comput. Math. Educ. (TURCOMAT)"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2007.015739"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2013.6947746"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2021-0044"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/IATMSI60426.2024.10503154"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI.2014.6965160"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462889"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN57995.2023.10199371"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3705217"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21290-2_1"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2018.01.04"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-023-09696-5"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI54926.2021.00291"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05909-5_8"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.3390\/info14120641"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1186\/2194-0827-1-1"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3261309"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10850915.pdf?arnumber=10850915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T19:22:33Z","timestamp":1738264953000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10850915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":170,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3533145","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}