{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:21:26Z","timestamp":1758248486892,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647941","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Structured Literature Review on Access Controls Mechanism in Block Chain Consensus Algorithm: State of Art and Future Direction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0244-103X","authenticated-orcid":false,"given":"Abhishek","family":"Dadhich","sequence":"first","affiliation":[{"name":"School of Computer Engineering, Poornima University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1464-0431","authenticated-orcid":false,"given":"Bright","family":"Keswani","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Poornima University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5442-5870","authenticated-orcid":false,"given":"Dinesh","family":"Goyal","sequence":"additional","affiliation":[{"name":"Computer Science, Poornima Institute of Engineering and Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v14i15.15893"},{"key":"e_1_3_2_1_2_1","volume-title":"Access control management in collaborative environment: A review. 9. 2851-2859","author":"Sampath","year":"2016","unstructured":"Sampath, Rajeshwari & Chandrasekar, A.. (2016). Access control management in collaborative environment: A review. 9. 2851-2859."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan3020150"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.03.090301"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809864"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2011.5999035"},{"key":"e_1_3_2_1_7_1","volume-title":"FDAC: Toward fine-grained distributed data access control in wireless sensor networks","author":"Yu S.","year":"2010","unstructured":"Yu, S., Ren, K., & Lou, W. (2010). FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE transactions on parallel and distributed systems, 22(4), 673-686."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.42"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-011-0345-8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2013.6720690"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.011772"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.014"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5120\/5602-7858"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.299"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.072511.102283"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344298"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699777.2699780"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17644-9_4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20092464"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.03.084"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805980"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.8.1106-1113"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107872"},{"issue":"3","key":"e_1_3_2_1_25_1","first-page":"457","article-title":"Fine-grained Access Control Scheme Supporting Cloud-assisted Write Permission Control in Cloud-aided E-Health System","volume":"24","author":"He K.","year":"2022","unstructured":"He, K., Wang, Z., Shi, J., Deng, A., & Lv, S. (2022). Fine-grained Access Control Scheme Supporting Cloud-assisted Write Permission Control in Cloud-aided E-Health System. International Journal of Network Security, 24(3), 457-468.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/23335777.2021.1922502"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120243"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102234"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13728-5_73"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2810065"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.04.074"},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Information Systems, Technology and Management (pp. 76-88)","author":"Bera P.","year":"2010","unstructured":"Bera, P., Ghosh, S. K., & Dasgupta, P. (2010, March). A spatio-temporal role-based access control model for wireless LAN security policy management. In International Conference on Information Systems, Technology and Management (pp. 76-88). Berlin, Heidelberg: Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979597"},{"key":"e_1_3_2_1_34_1","first-page":"1","article-title":"Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT","author":"Atlam H. F.","year":"2021","unstructured":"Atlam, H. F., Walters, R. J., Wills, G. B., & Daniel, J. (2021). Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT. Mobile Networks and Applications, 1-13.","journal-title":"Mobile Networks and Applications"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.11.001"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2733225"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22020634"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5592191"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063603"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647941","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:23:27Z","timestamp":1758216207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":39,"alternative-id":["10.1145\/3647444.3647941","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647941","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}