{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:42:35Z","timestamp":1725442955528},"reference-count":21,"publisher":"World Scientific Pub Co Pte Ltd","issue":"11n12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2020,11]]},"abstract":"<jats:p>The distributed multiple autonomous network has become the main trend of modern information systems, such as Cloud, Service-Oriented Architecture (SOA) and Internet of Things (IoT). Access control in such a heterogeneous and dynamic system has become a major information security challenge, which hinders the sharing of resources and information. In this work, we present an Attribute-Based Access Control (ABAC) model for cross-domain access control. The proposed access control model comprises a boundary control server designed to provide cross-domain access control capability. An eXtensible Access Control Markup Language (XACML) policy model-based implementation is introduced. Process and implementation show the proposed model alleviates the security risk on the domain boundary during the cross-domain access control process.<\/jats:p>","DOI":"10.1142\/s0218194020500400","type":"journal-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T10:46:08Z","timestamp":1611312368000},"page":"1851-1865","source":"Crossref","is-referenced-by-count":2,"title":["An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network"],"prefix":"10.1142","volume":"30","author":[{"given":"Yunpeng","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Information and Logistics Technology, College of Technology, University of Houston, 4730 Calhoun Road #300, Houston, TX 77024, USA"}]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[{"name":"Surface Imaging US Imaging, CGG Services (U.S.), Inc., 10300 Town Park Drive, Houston, TX 77072, USA"}]}],"member":"219","published-online":{"date-parts":[[2021,1,21]]},"reference":[{"key":"S0218194020500400BIB001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2019.02.008","volume":"153","author":"Hao J.","year":"2019","journal-title":"Comput. Netw."},{"issue":"1","key":"S0218194020500400BIB002","doi-asserted-by":"crossref","first-page":"3:1","DOI":"10.1186\/s42400-018-0020-9","volume":"2","author":"Colombo P.","year":"2019","journal-title":"Cybersecurity"},{"key":"S0218194020500400BIB003","series-title":"EAI\/Springer Innovations in Communication and Computing","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-319-92564-6_6","volume-title":"Cyber-Physical Systems: Architecture, Security and Application","author":"Uriarte M.","year":"2019"},{"key":"S0218194020500400BIB005","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-642-31540-4_4","volume-title":"DBSec 2012: Data and Applications Security and Privacy XXVI","volume":"7371","author":"Jin X.","year":"2012"},{"key":"S0218194020500400BIB006","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jnca.2018.03.006","volume":"112","author":"Li J.","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"S0218194020500400BIB007","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1109\/TIFS.2015.2493983","volume":"11","author":"Liu J. K.","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"S0218194020500400BIB008","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"Bonatti P. A.","year":"2002","journal-title":"J. Comput. Secur."},{"key":"S0218194020500400BIB009","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/POLICY.2008.30","volume-title":"Proc. 2008 IEEE Workshop on Policies for Distributed Systems and Networks","author":"Rao P.","year":"2008"},{"key":"S0218194020500400BIB010","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1542207.1542218","volume-title":"Proc. 14th ACM Symp. Access Control Models and Technologies","author":"Rao P.","year":"2009"},{"key":"S0218194020500400BIB011","first-page":"435","volume-title":"Proc. 2005 Int. Conf. Parallel Processing","author":"Huai J.","year":"2005"},{"key":"S0218194020500400BIB012","first-page":"89","volume-title":"Proc. 13th ACM Conf. Computer and Communications Security","author":"Goyal V.","year":"2006"},{"key":"S0218194020500400BIB013","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/PST.2013.6596061","volume-title":"Proc. 2013 Eleventh Annu. Int. Conf. Privacy, Security and Trust","author":"Ngo C.","year":"2013"},{"key":"S0218194020500400BIB014","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1073814.1073819","volume-title":"Proc. Twenty-Fourth Annu. ACM Symp. Principles of Distributed Computing","author":"Li J.","year":"2005"},{"issue":"3","key":"S0218194020500400BIB015","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.ijmedinf.2003.11.018","volume":"73","author":"Blobel B.","year":"2004","journal-title":"Int. J. Med. Inform."},{"key":"S0218194020500400BIB016","first-page":"36","volume-title":"Proc. 2018 IEEE 5th Int. Congr. Information Science and Technology","author":"Nabil D.","year":"2018"},{"issue":"09","key":"S0218194020500400BIB017","doi-asserted-by":"crossref","first-page":"1709","DOI":"10.1142\/S0218194015710047","volume":"25","author":"Pei X.","year":"2015","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"2","key":"S0218194020500400BIB018","doi-asserted-by":"crossref","first-page":"1539","DOI":"10.3233\/JIFS-179517","volume":"38","author":"Cai F.","year":"2020","journal-title":"J. Intell. Fuzzy Syst."},{"key":"S0218194020500400BIB020","first-page":"1","volume-title":"Proc. IEEE\/ACM 40th Int. Conf. Software Engineering: Software Engineering Education and Training","author":"Heckman S.","year":"2018"},{"key":"S0218194020500400BIB021","first-page":"27","volume-title":"Proc. Int. Conf. Dublin Core and Metadata for e-Communities 2002","author":"Maly K.","year":"2002"},{"key":"S0218194020500400BIB022","first-page":"196","volume-title":"Proc. 27th Int. Conf. Software Engineering","author":"Fisler K.","year":"2005"},{"key":"S0218194020500400BIB024","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s42979-020-00246-4","volume":"1","author":"Prince P. B.","year":"2020","journal-title":"SN Comput. Sci."}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194020500400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T20:36:21Z","timestamp":1697661381000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194020500400"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":21,"journal-issue":{"issue":"11n12","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["10.1142\/S0218194020500400"],"URL":"https:\/\/doi.org\/10.1142\/s0218194020500400","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11]]}}}