{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:36Z","timestamp":1750220256845,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research on network identity trusted communication technology architecture","award":["KWL21095530"],"award-info":[{"award-number":["KWL21095530"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506533","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"200-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightware Attribute Based Access Control Mechanism in Software Defined Internet of Things"],"prefix":"10.1145","author":[{"given":"Xu","family":"Han","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Technologies, Beijing Jiaotong University, Beijing, China"}]},{"given":"Xincheng","family":"Yan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mobile Network and Mobile Multimedia Technology, ZTE Corporation, Shenzhen, China and Nanjing, China"}]},{"given":"Na","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mobile Network and Mobile Multimedia Technology, ZTE Corporation, Shenzhen, China and Nanjing, China"}]},{"given":"Zhihong","family":"Jiang","sequence":"additional","affiliation":[{"name":"ZTE Corporation, Nanjing, China"}]},{"given":"Ranshuang","family":"Li","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Technologies, Beijing Jiaotong University, Beijing, China"}]},{"given":"Ying","family":"Liu","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Technologies, Beijing Jiaotong University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700433"},{"issue":"03","key":"e_1_3_2_1_2_1","first-page":"88","article-title":"Feedback-Aware Anomaly Detection Through Logs for Large-Scale Software Systems[J].","volume":"19","author":"Jing HAN","year":"2021","unstructured":"HAN Jing , JIA Tong , WU Yifan , HOU Chuanjia , LI Ying . Feedback-Aware Anomaly Detection Through Logs for Large-Scale Software Systems[J]. ZTE Communications , 2021 , 19 ( 03 ): 88 -- 94 . HAN Jing, JIA Tong, WU Yifan, HOU Chuanjia, LI Ying. Feedback-Aware Anomaly Detection Through Logs for Large-Scale Software Systems[J].ZTE Communications, 2021, 19(03):88--94.","journal-title":"ZTE Communications"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461195"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23458"},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"110","article-title":"BC-BLPM: A multi-level security access control model based on blockchain technology","volume":"18","author":"Yu X.","year":"2021","unstructured":"X. Yu , Z. Shu , Q. Li and J. Huang , \" BC-BLPM: A multi-level security access control model based on blockchain technology ,\" in China Towards SCommunications , vol. 18 , no. 2 , pp. 110 -- 135 , Feb. 2021 , doi: 10.23919\/JCC.2021.02.008. 10.23919\/JCC.2021.02.008 X. Yu, Z. Shu, Q. Li and J. Huang, \"BC-BLPM: A multi-level security access control model based on blockchain technology,\" in China Towards SCommunications, vol. 18, no. 2, pp. 110--135, Feb. 2021, doi: 10.23919\/JCC.2021.02.008.","journal-title":"China Towards SCommunications"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911166"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2633559"},{"key":"e_1_3_2_1_8_1","article-title":"An Automatic Attribute Based Access Control Policy Extraction from Access Logs","author":"Karimi L.","unstructured":"L. Karimi , M. Aldairi , J. Joshi and M. Abdelhakim , \" An Automatic Attribute Based Access Control Policy Extraction from Access Logs ,\" in IEEE Transactions on Dependable and Secure Computing , doi:10.1109\/TDSC.2021.3054331. 10.1109\/TDSC.2021.3054331 L. Karimi, M. Aldairi, J. Joshi and M. Abdelhakim, \"An Automatic Attribute Based Access Control Policy Extraction from Access Logs,\" in IEEE Transactions on Dependable and Secure Computing, doi:10.1109\/TDSC.2021.3054331.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"volume-title":"Proceedings of the 29th USENIX Security Symposium (pp. 595-612)","author":"Morrison L.","key":"e_1_3_2_1_9_1","unstructured":"Kang, Q., Xue, L. Morrison , A., Tang, Y., Chen, A., & Luo, X.. Programmable innetwork security for context-aware BYOD policies . In Proceedings of the 29th USENIX Security Symposium (pp. 595-612) . USENIX Association. Kang, Q., Xue, L. Morrison, A., Tang, Y., Chen, A., & Luo, X.. Programmable innetwork security for context-aware BYOD policies. In Proceedings of the 29th USENIX Security Symposium (pp. 595-612). USENIX Association."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of ACM Special Interest Group on Data Communication (SIGCOMM'19)","author":"Tian Bingchuan","year":"2019","unstructured":"Bingchuan Tian , Xinyi Zhang , Ennan Zhai , Hongqiang Harry Liu , Qiaobo Ye , . \" Safely and Automatically Updating In-Network ACL Configurations with Intent Language .\" Proceedings of ACM Special Interest Group on Data Communication (SIGCOMM'19) , Beijing, China , August 19-24, 2019 . Bingchuan Tian, Xinyi Zhang, Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, et al.. \"Safely and Automatically Updating In-Network ACL Configurations with Intent Language.\" Proceedings of ACM Special Interest Group on Data Communication (SIGCOMM'19), Beijing, China, August 19-24, 2019."}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:47Z","timestamp":1750188647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506533"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":10,"alternative-id":["10.1145\/3491396.3506533","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506533","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}