{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:12:27Z","timestamp":1766733147215,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3660395.3660412","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T18:30:40Z","timestamp":1717266640000},"page":"92-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Dynamic Access Control Method Based on User Behavior Trust Evaluation in Edge Cloud Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9325-6861","authenticated-orcid":false,"given":"Hanwen","family":"Zhang","sequence":"first","affiliation":[{"name":"No.30 Research Institute of China Electronics Technology Group Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7472-0318","authenticated-orcid":false,"given":"Gang","family":"Wen","sequence":"additional","affiliation":[{"name":"No.30 Research Institute of China Electronics Technology Group Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9172-7843","authenticated-orcid":false,"given":"Dong","family":"Liu","sequence":"additional","affiliation":[{"name":"No.30 Research Institute of China Electronics Technology Group Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3599-0952","authenticated-orcid":false,"given":"Guishan","family":"Dong","sequence":"additional","affiliation":[{"name":"No.30 Research Institute of China Electronics Technology Group Corporation, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.238"},{"issue":"8","key":"e_1_3_2_1_2_1","first-page":"36","article-title":"Research progress on edge cloud computing security related technologies [J]","volume":"38","author":"Shen Q","year":"2021","unstructured":"Shen Q. Research progress on edge cloud computing security related technologies [J]. Automation Expo, 2021, Volume 38 (8): 36-42.\u00a0","journal-title":"Automation Expo"},{"key":"e_1_3_2_1_3_1","first-page":"8","article-title":"A Survey of Zero-Trust Security Architecture [J]","volume":"8","author":"Zhang Z","year":"2021","unstructured":"Zhang Z, Wang P. A Survey of Zero-Trust Security Architecture [J]. Secrecy Science and Technology, 2021, (8): 8-16.","journal-title":"Secrecy Science and Technology"},{"issue":"4","key":"e_1_3_2_1_4_1","first-page":"1051","article-title":"Access Control Model Based on User Behavior Trust in Cloud Computing [J]","volume":"34","author":"Zhang K","year":"2014","unstructured":"Zhang K, Pan X. Access Control Model Based on User Behavior Trust in Cloud Computing [J]. Computer Applications, 2014,34 (4): 1051-1054.","journal-title":"Computer Applications"},{"key":"e_1_3_2_1_5_1","volume-title":"A cloud computing access control model based on task behavior [J]","author":"Gao Y","year":"2015","unstructured":"Gao Y, Zhang Y, Zou J. A cloud computing access control model based on task behavior [J]. Journal of Shandong Normal University (Natural Science Edition), 2015, Volume 30 (1): 15-19."},{"issue":"6","key":"e_1_3_2_1_6_1","first-page":"99","article-title":"Research on Dynamic Access Control Model Based on User Access Behavior in Cloud Computing Environment [J]","volume":"45","author":"Duan L","year":"2021","unstructured":"Duan L, Zhu L, Yue Y, Lv Z, Wang F, Li F. Research on Dynamic Access Control Model Based on User Access Behavior in Cloud Computing Environment [J]. Mobile Communications, 2021, Volume 45 (6): 99-102.","journal-title":"Mobile Communications"},{"key":"e_1_3_2_1_7_1","first-page":"1129","article-title":"A Review of Cloud Computing Access Control Technology * [J]","volume":"5","author":"Wang Y","year":"2015","unstructured":"Wang Y, Yang J, Xu C, Ling X, Yang Y. A Review of Cloud Computing Access Control Technology * [J]. Journal of Software, 2015, (5): 1129-1150","journal-title":"Journal of Software"},{"issue":"4","key":"e_1_3_2_1_8_1","first-page":"1128","article-title":"Research on Database User Behavior Anomaly Detection Based on K-means and Naive Bayes [J]","volume":"37","author":"Wang X","year":"2020","unstructured":"Wang X, Feng A, He F, Ma H, Yang J. Research on Database User Behavior Anomaly Detection Based on K-means and Naive Bayes [J]. Computer Application Research, 2020, Volume 37 (4): 1128-1131.","journal-title":"Computer Application Research"},{"issue":"3","key":"e_1_3_2_1_9_1","first-page":"65","article-title":"Research on User Behavior Trust Evaluation in Cloud Environment Based on AHP [J]","volume":"34","author":"Yang Zhangwei","year":"2017","unstructured":"Yang Zhangwei, He Honglin. Research on User Behavior Trust Evaluation in Cloud Environment Based on AHP [J]. Journal of Pingxiang University, 2017, Volume 34 (3): 65-68.","journal-title":"Journal of Pingxiang University"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"issue":"35","key":"e_1_3_2_1_11_1","first-page":"29","article-title":"Research on Access Trust Technology for Big Data Platforms Based on Dynamic and Continuous Identity Authentication [J]","volume":"36","author":"Shi Lin","year":"2019","unstructured":"Shi Lin, Zhang Jun, Chen Ning. Research on Access Trust Technology for Big Data Platforms Based on Dynamic and Continuous Identity Authentication [J]. Jiangsu Science and Technology Information, 2019, Volume 36 (35): 29-32.","journal-title":"Jiangsu Science and Technology Information"}],"event":{"name":"AIBDF 2023: 2023 3rd Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum","acronym":"AIBDF 2023","location":"Guangzhou China"},"container-title":["Proceedings of the 2023 3rd Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660395.3660412","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660395.3660412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:34:14Z","timestamp":1755905654000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660395.3660412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":11,"alternative-id":["10.1145\/3660395.3660412","10.1145\/3660395"],"URL":"https:\/\/doi.org\/10.1145\/3660395.3660412","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2024-06-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}