{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:44Z","timestamp":1740149024721,"version":"3.37.3"},"reference-count":9,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016YFB0801001","61672515"],"award-info":[{"award-number":["2016YFB0801001","61672515"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0801001","61672515"],"award-info":[{"award-number":["2016YFB0801001","61672515"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>The rapid development of communication and network technologies including mobile networks and GPS presents new characteristics of OSNs. These new characteristics pose extra requirements on the access control schemes of OSNs, which cannot be satisfied by relationship-based access control currently. In this paper, we propose a hybrid access control model (HAC) which leverages attributes and relationships to control access to resources. A new policy specification language is developed to define policies considering the relationships and attributes of users. A path checking algorithm is proposed to figure out whether paths between two users can fit in with the hybrid policy. We develop a prototype system and demonstrate the feasibility of the proposed model.<\/jats:p>","DOI":"10.1155\/2018\/7384194","type":"journal-article","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T23:32:04Z","timestamp":1526599924000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["HAC: Hybrid Access Control for Online Social Networks"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5586-6715","authenticated-orcid":true,"given":"Fangfang","family":"Shan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Network, School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"},{"name":"School of Computer Science, Zhongyuan University of Technology, Zhengzhou 450000, China"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Network, School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9611-5368","authenticated-orcid":true,"given":"Yunchuan","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"}]},{"given":"Ben","family":"Niu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0975-x"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2692648"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609962"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.003"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.01.001"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.06.017"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2609884"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406705"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.04.013"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/7384194.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/7384194.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/7384194.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T14:09:23Z","timestamp":1589897363000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/7384194\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":9,"alternative-id":["7384194","7384194"],"URL":"https:\/\/doi.org\/10.1155\/2018\/7384194","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018]]}}}