{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:51Z","timestamp":1750309551647,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:00Z","timestamp":1740096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,21]]},"DOI":"10.1145\/3728725.3728805","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T21:00:02Z","timestamp":1749070802000},"page":"509-514","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research and Implementation of Access Control Strategy Based on Apriori and Collaborative Filtering Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4384-3985","authenticated-orcid":false,"given":"Hongfu","family":"Chen","sequence":"first","affiliation":[{"name":"State Grid Shanghai Municipal Electric Power Company, Pudong New Area, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1206-1673","authenticated-orcid":false,"given":"Minghui","family":"Jin","sequence":"additional","affiliation":[{"name":"State Grid Shanghai Municipal Electric Power Company, Pudong New Area, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1682-5968","authenticated-orcid":false,"given":"Feng","family":"Gao","sequence":"additional","affiliation":[{"name":"State Grid Shanghai Municipal Electric Power Company, Pudong New Area, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6853-5005","authenticated-orcid":false,"given":"Yujia","family":"Zhai","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute Co. Ltd., Gulou District, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,3]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/3582935.3582998"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3696500.3696585"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448734.3450799"},{"key":"e_1_3_3_1_4_2","first-page":"3899","volume-title":"Cluster Computing","author":"Wu","year":"2022","unstructured":"Wu Z, Shi R, Li K, et al. Attribute-based data access control scheme with secure revocation in fog computing for smart grid[J]. Cluster Computing, 2022, 25(6): 3899-3913."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3579654.3579693"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3689738"},{"key":"e_1_3_3_1_7_2","first-page":"2864","volume-title":"IEEE Transactions on Dependable and Secure Computing","author":"Ge","year":"2021","unstructured":"Ge C, Susilo W, Baek J, et al. Revocable attribute-based encryption with data integrity in clouds[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 19(5): 2864-2872."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3049141"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3661638.3661710"}],"event":{"name":"GAIIS 2025: 2025 2nd International Conference on Generative Artificial Intelligence and Information Security","acronym":"GAIIS 2025","location":"Hangzhou China"},"container-title":["Proceedings of the 2025 2nd International Conference on Generative Artificial Intelligence and Information Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728725.3728805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3728725.3728805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:48Z","timestamp":1750295928000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728725.3728805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,21]]},"references-count":9,"alternative-id":["10.1145\/3728725.3728805","10.1145\/3728725"],"URL":"https:\/\/doi.org\/10.1145\/3728725.3728805","relation":{},"subject":[],"published":{"date-parts":[[2025,2,21]]},"assertion":[{"value":"2025-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}