{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:36Z","timestamp":1750221216182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T00:00:00Z","timestamp":1521158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,16]]},"DOI":"10.1145\/3199478.3199494","type":"proceedings-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T16:26:42Z","timestamp":1531240002000},"page":"89-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Role and Node Based Access Control Model for Industrial Control Network"],"prefix":"10.1145","author":[{"given":"Shenwen","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Computer Applications, China Academy of Engineering Physics, Mianyang, Sichuan, China"}]},{"given":"Yonghui","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Computer Applications, China Academy of Engineering Physics, Mianyang, Sichuan, China"}]},{"given":"Tao","family":"Xia","sequence":"additional","affiliation":[{"name":"Institute of Computer Applications, China Academy of Engineering Physics, Mianyang, Sichuan, China"}]},{"given":"Weiyan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Computer Applications, China Academy of Engineering Physics, Mianyang, Sichuan, China"}]}],"member":"320","published-online":{"date-parts":[[2018,3,16]]},"reference":[{"volume-title":"Proceedings of the 15th National Computer Security Conference","year":"1992","author":"Ferraiolo D F","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300839"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"volume-title":"Proceedings of the 11th IFIP WG11. 3 Conference on Database Security {C}.Lake Tahoe","year":"1997","author":"Thomas R","key":"e_1_3_2_1_5_1"},{"volume-title":"IEEE Computer Society","year":"2002","author":"Freudenthal E","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.206"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2006.63"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"e_1_3_2_1_11_1","first-page":"9","article-title":"Access control based on role and trust and its implementation on Hadoop{J}","volume":"12","author":"Yu Wanjun","year":"2017","journal-title":"Modern Electronics Technique"},{"key":"e_1_3_2_1_12_1","unstructured":"Wang Yuding Yang Jiahai. Data access control model based on data's role and attributes for cloud computing{J}. J Tsinghua Univ (Sci & Technol) 2017 Vol.57 No.11 1150--1158.  Wang Yuding Yang Jiahai. Data access control model based on data's role and attributes for cloud computing{J}. J Tsinghua Univ (Sci & Technol) 2017 Vol.57 No.11 1150--1158."},{"key":"e_1_3_2_1_13_1","first-page":"33","article-title":"A Novel Trust-based Dynamic Access Control Model{J}","volume":"12","author":"Xing Xuliang","year":"2017","journal-title":"Journal of Shanghai University of Electric Power"},{"key":"e_1_3_2_1_14_1","unstructured":"Lei Lei Cai Quanwei Jing Jiwu el at. Enforcing access control on encrypted cloud storage with policy hiding{J}. Ruan Jian Xue Bao\/Journal of software 2016 27(06) 1432--1450.  Lei Lei Cai Quanwei Jing Jiwu el at. Enforcing access control on encrypted cloud storage with policy hiding{J}. Ruan Jian Xue Bao\/Journal of software 2016 27(06) 1432--1450."},{"volume-title":"Online Publishing No.79.","year":"2016","author":"Fang Liang","key":"e_1_3_2_1_15_1"},{"issue":"5","key":"e_1_3_2_1_16_1","first-page":"9","article-title":"Novel cyberspace-oriented access control model","volume":"37","author":"Li Fenghua","year":"2016","journal-title":"Journey on Communications"}],"event":{"name":"ICCSP 2018: 2018 the 2nd International Conference on Cryptography, Security and Privacy","sponsor":["Wuhan Univ. Wuhan University, China","University of Electronic Science and Technology of China University of Electronic Science and Technology of China"],"location":"Guiyang China","acronym":"ICCSP 2018"},"container-title":["Proceedings of the 2nd International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3199478.3199494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3199478.3199494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:51Z","timestamp":1750210791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3199478.3199494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,16]]},"references-count":16,"alternative-id":["10.1145\/3199478.3199494","10.1145\/3199478"],"URL":"https:\/\/doi.org\/10.1145\/3199478.3199494","relation":{},"subject":[],"published":{"date-parts":[[2018,3,16]]},"assertion":[{"value":"2018-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}