{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:17Z","timestamp":1750309457565,"version":"3.41.0"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172301 NSFC and 61772371 NSFC"],"award-info":[{"award-number":["62172301 NSFC and 61772371 NSFC"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Program of China","award":["2021YFC3340601 NKRDP"],"award-info":[{"award-number":["2021YFC3340601 NKRDP"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["22120210545 RFRCU"],"award-info":[{"award-number":["22120210545 RFRCU"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shanghai Municipal Science and Technology Major Project","award":["2021SHZDZX0100 SMSTMP"],"award-info":[{"award-number":["2021SHZDZX0100 SMSTMP"]}]},{"name":"Fundamental Research Funds for the Central Universities, the Science and Technology Program of Shanghai, China","award":["22511104300 STPS and 20ZR1460500 STPS"],"award-info":[{"award-number":["22511104300 STPS and 20ZR1460500 STPS"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2024,9,30]]},"abstract":"<jats:p>With the rapid growth of wireless sensor networks, secure data transmission, storage, and distribution in such networks has become an urgent demand. To defend against security risks such as data leakage, key compromise, and unauthorized misuse of data simultaneously, we propose a novel obfuscatable ciphertext-policy attribute-based re-encryption scheme with a specially designed obfuscator. The proposed scheme leverages program obfuscation to transform the re-encryption program codes into an unintelligible form and embed the private keys into the obfuscated implementation. Consequently, the proposed scheme protects data confidentiality and keeps the secrecy of the private key while providing fine-grained access control. Formal proofs for the security of the proposed re-encryption scheme and the obfuscator are provided. Extensive experiments have been conducted on representative platforms, including cloud servers, workstations, and embedded devices, to evaluate the computational efficiency and energy consumption of the scheme. Experimental results indicate that the scheme achieves high efficiency on various platforms and economical energy consumption on typical embedded devices with constrained resources.<\/jats:p>","DOI":"10.1145\/3687127","type":"journal-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T10:22:26Z","timestamp":1723026146000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0896-5214","authenticated-orcid":false,"given":"Minyu","family":"Teng","sequence":"first","affiliation":[{"name":"School of Software Engineering, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5958-5420","authenticated-orcid":false,"given":"Jingxuan","family":"Han","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8805-7522","authenticated-orcid":false,"given":"Jintao","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Tongji University, Shanghai China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8954-1668","authenticated-orcid":false,"given":"Jiayao","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Tongji University, Shanghai China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1128-3259","authenticated-orcid":false,"given":"Jiangfeng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Tongji University, Shanghai China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3905-2257","authenticated-orcid":false,"given":"Yang","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Tongji University, Shanghai China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,20]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800083"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_3_2_4_2","first-page":"1","volume-title":"Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, CA, August 19\u201323, 2001 Proceedings","author":"Barak Boaz","year":"2001","unstructured":"Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. 2001. On the (im) possibility of obfuscating programs. In Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, CA, August 19\u201323, 2001 Proceedings. Springer, 1\u201318."},{"key":"e_1_3_2_5_2","article-title":"Secure schemes for secret sharing and key distribution [Ph.D. Thesis]","author":"Beimel Amos","year":"1996","unstructured":"Amos Beimel. 1996. Secure schemes for secret sharing and key distribution [Ph.D. Thesis]. Haifa: Israel Institute of Technology (1996).","journal-title":"Haifa: Israel Institute of Technology"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology\u2013EUROCRYPT\u201998: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31\u2013June 4, 1998 Proceedings 17","author":"Blaze Matt","year":"1998","unstructured":"Matt Blaze, Gerrit Bleumer, and Martin Strauss. 1998. Divertible protocols and atomic proxy cryptography. In Advances in Cryptology\u2013EUROCRYPT\u201998: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31\u2013June 4, 1998 Proceedings 17. Springer, 127\u2013144."},{"key":"e_1_3_2_8_2","first-page":"48","volume-title":"Algorithmic Number Theory: 3rd International Symposiun, ANTS-III Portland, OR, June 21\u201325, 1998 Proceedings","author":"Boneh Dan","year":"2006","unstructured":"Dan Boneh. 2006. The decision Diffie-Hellman problem. In Algorithmic Number Theory: 3rd International Symposiun, ANTS-III Portland, OR, June 21\u201325, 1998 Proceedings. Springer, 48\u201363."},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, 2004. Proceedings 23","author":"Boneh Dan","year":"2004","unstructured":"Dan Boneh and Xavier Boyen. 2004. Efficient selective-ID secure identity-based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, 2004. Proceedings 23. Springer, 223\u2013238."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, CA, August 19\u201323, 2001 Proceedings","author":"Boneh Dan","year":"2001","unstructured":"Dan Boneh and Matt Franklin. 2001. Identity-based encryption from the Weil pairing. In Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, CA, August 19\u201323, 2001 Proceedings. Springer, 213\u2013229."},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315269"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-642-54631-0_6","volume-title":"Public-Key Cryptography\u2013PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26\u201328, 2014. Proceedings 17","author":"Chandran Nishanth","year":"2014","unstructured":"Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, and Keita Xagawa. 2014. Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. In Public-Key Cryptography\u2013PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26\u201328, 2014. Proceedings 17. Springer, 95\u2013112."},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21\u201324, 2007. Proceedings 4","author":"Chase Melissa","year":"2007","unstructured":"Melissa Chase. 2007. Multi-authority attribute based encryption. In Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21\u201324, 2007. Proceedings 4. Springer, 515\u2013534."},{"key":"e_1_3_2_15_2","first-page":"1","volume-title":"IECON 2022\u201348th Annual Conference of the IEEE Industrial Electronics Society","author":"Chaves Pedro","year":"2022","unstructured":"Pedro Chaves, Tiago Fonseca, Luis Lino Ferreira, Bernardo Cabral, Orlando Sousa, Andr\u00e9 Oliveira, and Jorge Landeck. 2022. An IoT cloud and big data architecture for the maintenance of home appliances. In IECON 2022\u201348th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 1\u20136."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3043950"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3325996"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1112"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3399"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3109761.3158388"},{"key":"e_1_3_2_21_2","article-title":"Towards diversified IoT services in mobile edge computing","author":"Ding Chuntao","year":"2021","unstructured":"Chuntao Ding, Ao Zhou, Xiao Ma, Ning Zhang, Ching-Hsien Hsu, and Shangguang Wang. 2021. Towards diversified IoT services in mobile edge computing. IEEE Transactions on Cloud Computing (2021).","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_22_2","first-page":"1","volume-title":"2020 2nd 6G Wireless Summit (6G SUMMIT)","author":"Ejaz Muneeb","year":"2020","unstructured":"Muneeb Ejaz, Tanesh Kumar, Mika Ylianttila, and Erkki Harjula. 2020. Performance and efficiency optimization of multi-layer IoT edge architecture. In 2020 2nd 6G Wireless Summit (6G SUMMIT). IEEE, 1\u20135."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2899300"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3076580"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"issue":"1","key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TDSC.2018.2877601","article-title":"Accountable proxy re-encryption for secure data sharing","volume":"18","author":"Guo Hui","year":"2018","unstructured":"Hui Guo, Zhenfeng Zhang, Jing Xu, Ningyu An, and Xiao Lan. 2018. Accountable proxy re-encryption for secure data sharing. IEEE Transactions on Dependable and Secure Computing 18, 1 (2018), 145\u2013159.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3234210"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833692"},{"key":"e_1_3_2_31_2","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/978-3-540-70936-7_13","volume-title":"Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21\u201324, 2007. Proceedings 4","author":"Hohenberger Susan","year":"2007","unstructured":"Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, and Vinod Vaikuntanathan. 2007. Securely obfuscating re-encryption. In Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21\u201324, 2007. Proceedings 4. Springer, 233\u2013252."},{"key":"e_1_3_2_32_2","first-page":"1476","volume-title":"2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS\u201919)","author":"Huang Yaodong","year":"2019","unstructured":"Yaodong Huang, Jiarui Zhang, Jun Duan, Bin Xiao, Fan Ye, and Yuanyuan Yang. 2019. Resource allocation and consensus on edge blockchain in pervasive edge computing environments. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS\u201919). IEEE, 1476\u20131486."},{"key":"e_1_3_2_33_2","article-title":"A ring learning with errors-based ciphertext-policy attribute-based proxy re-encryption scheme for secure big data sharing in cloud environment","author":"Li Juyan","year":"2022","unstructured":"Juyan Li, Jialiang Peng, and Zhiqi Qiao. 2022. A ring learning with errors-based ciphertext-policy attribute-based proxy re-encryption scheme for secure big data sharing in cloud environment. Big Data (2022).","journal-title":"Big Data"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2975184"},{"issue":"1","key":"e_1_3_2_35_2","first-page":"131","article-title":"Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption","volume":"24","author":"Li Ming","year":"2012","unstructured":"Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou. 2012. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems 24, 1 (2012), 131\u2013143.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2013.103"},{"key":"e_1_3_2_37_2","first-page":"466","volume-title":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C\u201919)","author":"Lin Jun","year":"2019","unstructured":"Jun Lin and Lan Liu. 2019. Research on security detection and data analysis for industrial Internet. In 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C\u201919). IEEE, 466\u2013470."},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993231"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02202-9"},{"key":"e_1_3_2_40_2","first-page":"99","volume-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security 2006","author":"McDaniel P.","year":"2006","unstructured":"P. McDaniel. 2006. Secure atrribute-based systems. In Proceedings of the 13th ACM Conference on Computer and Communications Security 2006. 99\u2013112."},{"key":"e_1_3_2_41_2","first-page":"3647","volume-title":"31st USENIX Security Symposium (USENIX Security\u201922)","author":"Purnal Antoon","year":"2022","unstructured":"Antoon Purnal, Furkan Turan, and Ingrid Verbauwhede. 2022. Double trouble: Combined heterogeneous attacks on \\(\\lbrace\\) Non-Inclusive \\(\\rbrace\\) cache hierarchies. In 31st USENIX Security Symposium (USENIX Security\u201922). 3647\u20133664."},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3362031"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2019091"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"e_1_3_2_46_2","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005. Proceedings 24","author":"Sahai Amit","year":"2005","unstructured":"Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. In Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005. Proceedings 24. Springer, 457\u2013473."},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.03.026"},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/978-3-319-61204-1_14","volume-title":"Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10\u201312, 2017, Proceedings","author":"Srinivasan Akshayaram","year":"2017","unstructured":"Akshayaram Srinivasan and Chandrasekaran Pandu Rangan. 2017. Efficiently obfuscating re-encryption program under DDH assumption. In Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10\u201312, 2017, Proceedings. Springer, 273\u2013292."},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00064"},{"key":"e_1_3_2_50_2","article-title":"The growth model of industrial Internet platform in Industrial 4.0","volume":"2022","author":"Wang Lei","year":"2022","unstructured":"Lei Wang, Zi Ye, Rui Zhang, Jing Lin, Fei Chen, and Fangqing Tang. 2022. The growth model of industrial Internet platform in Industrial 4.0. Wireless Communications and Mobile Computing 2022 (2022).","journal-title":"Wireless Communications and Mobile Computing"},{"key":"e_1_3_2_51_2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography\u2013PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6\u20139, 2011. Proceedings 14","author":"Waters Brent","year":"2011","unstructured":"Brent Waters. 2011. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public Key Cryptography\u2013PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6\u20139, 2011. Proceedings 14. Springer, 53\u201370."},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3010521"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417544"},{"key":"e_1_3_2_54_2","first-page":"644","volume-title":"2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT\u201921)","author":"Yang Xiaodong","year":"2021","unstructured":"Xiaodong Yang, Hang Zhou, Ningnig Ren, and Tian Tian. 2021. Homomorphic proxy re-signcryption scheme and its application in edge computing-enhanced IoT. In 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT\u201921). IEEE, 644\u2013649."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1435"},{"issue":"4","key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"2459","DOI":"10.1109\/JIOT.2020.3017742","article-title":"STEC-IoT: A security tactic by virtualizing edge computing on IoT","volume":"8","author":"Zhang Peiying","year":"2020","unstructured":"Peiying Zhang, Chunxiao Jiang, Xue Pang, and Yi Qian. 2020. STEC-IoT: A security tactic by virtualizing edge computing on IoT. IEEE Internet of Things Journal 8, 4 (2020), 2459\u20132467.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_57_2","doi-asserted-by":"crossref","unstructured":"M. Pirretti P. Traynor P. McDaniel and B. Waters. 2006. Secure attribute-based systems. In Proceedings of the 13th ACM Conference on Computer and Communications Security. 99\u2013112.","DOI":"10.1145\/1180405.1180419"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3687127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3687127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:21Z","timestamp":1750295421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3687127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,20]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9,30]]}},"alternative-id":["10.1145\/3687127"],"URL":"https:\/\/doi.org\/10.1145\/3687127","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2024,9,20]]},"assertion":[{"value":"2023-07-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}