{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:44Z","timestamp":1750220444418,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,28]]},"DOI":"10.1145\/3448734.3450468","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T15:48:00Z","timestamp":1621266480000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Key Technology of Access Control Policies Based on Multi-Agent"],"prefix":"10.1145","author":[{"given":"Tong","family":"Wu","sequence":"first","affiliation":[{"name":"Beijing Institute of Computer Technology and Application"}]},{"given":"Guangzhi","family":"Xu","sequence":"additional","affiliation":[{"name":"China Academy of Electronics and Information Technology"}]},{"given":"Yongli","family":"Song","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Application"}]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Henan Pingyuan Optics Electronics Co Ltd"}]}],"member":"320","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CHU Tianyi LI Fenghua JIN Wei Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy[J]. Journal of communications. 2020:1-20.  CHU Tianyi LI Fenghua JIN Wei Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy[J]. Journal of communications. 2020:1-20."},{"issue":"07","key":"e_1_3_2_1_2_1","first-page":"1801","article-title":"User attribute-based fine grained access control for big data[J]","volume":"41","author":"Jialong WANG","year":"2020","unstructured":"WANG Jialong , TAI Xianqing , MA Zhijie . User attribute-based fine grained access control for big data[J] . Computer Engineering and Design . 2020 , 41 ( 07 ): 1801 - 1808 . WANG Jialong, TAI Xianqing, MA Zhijie. User attribute-based fine grained access control for big data[J]. Computer Engineering and Design. 2020, 41(07):1801-1808.","journal-title":"Computer Engineering and Design"},{"issue":"07","key":"e_1_3_2_1_3_1","first-page":"56","article-title":"Research progress on risk access control[J]","volume":"47","author":"Jingyu WANG","year":"2020","unstructured":"WANG Jingyu , LIU Sirui . Research progress on risk access control[J] . Computer science , 2020 , 47 ( 07 ): 56 - 65 . WANG Jingyu, LIU Sirui. Research progress on risk access control[J]. Computer science, 2020,47(07):56-65.","journal-title":"Computer science"},{"key":"e_1_3_2_1_4_1","first-page":"19","volume-title":"Netinfo Security","author":"Xiaofeng LUO","year":"2016","unstructured":"LUO Xiaofeng , WANG Wenxian , LUO Wanbo . The Retrospect and Prospect of Access Control Technology[J] . Netinfo Security , 2016 (12) : 19 - 27 . LUO Xiaofeng, WANG Wenxian, LUO Wanbo. The Retrospect and Prospect of Access Control Technology[J]. Netinfo Security, 2016 (12) : 19-27."},{"key":"e_1_3_2_1_5_1","volume-title":"Research on dynamic access control policy based on Trusted Computing[J]. Network security technology and Application","author":"Xinghua SHI","year":"2019","unstructured":"SHI Xinghua , CAO Jinxuan , ZHU Yancheng . Research on dynamic access control policy based on Trusted Computing[J]. Network security technology and Application , 2019 (03):18-20. SHI Xinghua, CAO Jinxuan, ZHU Yancheng. Research on dynamic access control policy based on Trusted Computing[J]. Network security technology and Application, 2019(03):18-20."},{"issue":"01","key":"e_1_3_2_1_6_1","first-page":"321","article-title":"A dynamic access control strategy for service composition based on certificate[J]","volume":"34","author":"Xue SU","year":"2017","unstructured":"SU Xue , SONG Guoxin , ZHANG Xiaoyun . A dynamic access control strategy for service composition based on certificate[J] . Computer Applications and Software , 2017 , 34 ( 01 ): 321 - 327 . SU Xue, SONG Guoxin, ZHANG Xiaoyun. A dynamic access control strategy for service composition based on certificate[J]. Computer Applications and Software, 2017,34(01):321-327.","journal-title":"Computer Applications and Software"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Bourhis Pierre Reutter Juan L. Vrgo\u00c4 Domagoj. JSON: Data model and query languages[J]. Information Systems 2020 89(C).  Bourhis Pierre Reutter Juan L. Vrgo\u00c4 Domagoj. JSON: Data model and query languages[J]. Information Systems 2020 89(C).","DOI":"10.1016\/j.is.2019.101478"},{"key":"e_1_3_2_1_8_1","volume-title":"Research on security device access control policy conflict detection in linkage system[J]. Electric power information and communication technology","author":"Zherui HOU","year":"2016","unstructured":"HOU Zherui , WU Ziwei , CHEN Lei , CHENG Xiaorong . Research on security device access control policy conflict detection in linkage system[J]. Electric power information and communication technology , 2016 ,14(08):33-37. HOU Zherui, WU Ziwei, CHEN Lei, CHENG Xiaorong. Research on security device access control policy conflict detection in linkage system[J]. Electric power information and communication technology, 2016,14(08):33-37."},{"issue":"03","key":"e_1_3_2_1_9_1","first-page":"102","article-title":"Quantity Analysis of Robot in Intelligent Warehouse Based on Queuing Theory[J]","volume":"41","author":"Hua YAN","year":"2020","unstructured":"YAN Hua , LI Lirong , WAN Fei , Quantity Analysis of Robot in Intelligent Warehouse Based on Queuing Theory[J] . Journal of Ordnance Equipment Engineering , 2020 , 41 ( 03 ): 102 - 105 . YAN Hua,LI Lirong,WAN Fei,et al. Quantity Analysis of Robot in Intelligent Warehouse Based on Queuing Theory[J]. Journal of Ordnance Equipment Engineering, 2020, 41(03): 102-105.","journal-title":"Journal of Ordnance Equipment Engineering"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Improved GERT based time characteristic modeling and analysis method for task Process[J]","volume":"2020","author":"Hongqing XIA","unstructured":"XIA Hongqing , JIAO Jian , CHU Jiayun , ZHAO Tingdi . Improved GERT based time characteristic modeling and analysis method for task Process[J] . Journal of Beijing University of Aeronautics and Astronautics , 2020 : 1 - 11 . XIA Hongqing, JIAO Jian, CHU Jiayun, ZHAO Tingdi. Improved GERT based time characteristic modeling and analysis method for task Process[J]. Journal of Beijing University of Aeronautics and Astronautics, 2020:1-11.","journal-title":"Journal of Beijing University of Aeronautics and Astronautics"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Queue Theory Modeling and Effectiveness Analysis of Communication Electronic Warfare System[J\/OL]","volume":"2020","author":"Luda ZHAO","unstructured":"ZHAO Luda , WANG Bin , JIANG Futao . Queue Theory Modeling and Effectiveness Analysis of Communication Electronic Warfare System[J\/OL] . Telecommunication Engineering , 2020 : 1 - 8 . ZHAO Luda, WANG Bin, JIANG Futao. Queue Theory Modeling and Effectiveness Analysis of Communication Electronic Warfare System[J\/OL]. Telecommunication Engineering, 2020:1-8.","journal-title":"Telecommunication Engineering"}],"event":{"name":"CONF-CDS 2021: The 2nd International Conference on Computing and Data Science","acronym":"CONF-CDS 2021","location":"Stanford CA USA"},"container-title":["The 2nd International Conference on Computing and Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448734.3450468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:37Z","timestamp":1750193257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":11,"alternative-id":["10.1145\/3448734.3450468","10.1145\/3448734"],"URL":"https:\/\/doi.org\/10.1145\/3448734.3450468","relation":{},"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"2021-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}