{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T11:45:47Z","timestamp":1743853547355,"version":"3.37.3"},"reference-count":20,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,4,4]],"date-time":"2021-04-04T00:00:00Z","timestamp":1617494400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62062007"],"award-info":[{"award-number":["62062007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,4,4]]},"abstract":"<jats:p>With the widespread application of new technologies, fine-grained authorization requires a large number of access control policies. However, the existing policy retrieval method applied to a large-scale policy environment has the problem of low retrieval efficiency. Therefore, this paper proposes an attribute access control policy retrieval method based on the binary sequence. This method uses binary identification and binary code to express access control requests and policies. When the policy is retrieved, the appropriate group is selected through the logical operation of the access control request and the policy binary identification. Within the group, the binary code of the access control request is matched with the binary code of all rules to find suitable rules, thereby reducing the number of matching attribute-value pairs in the rule and improving the efficiency of policy retrieval. Experimental results show that the policy retrieval method proposed in this paper has higher retrieval efficiency.<\/jats:p>","DOI":"10.1155\/2021\/5582921","type":"journal-article","created":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T22:20:08Z","timestamp":1617661208000},"page":"1-12","source":"Crossref","is-referenced-by-count":8,"title":["An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence"],"prefix":"10.1155","volume":"2021","author":[{"given":"Ruijie","family":"Pan","sequence":"first","affiliation":[{"name":"School of Computer and Electronic and Information, Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3016-9037","authenticated-orcid":true,"given":"Gaocai","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Electronic and Information, Guangxi University, Nanning, China"}]},{"given":"Man","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer and Electronic and Information, Guangxi University, Nanning, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2875915"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2870288"},{"issue":"4","key":"3","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.dcan.2019.10.004","article-title":"A service-based RBAC & MAC approach incorporated into the FHIR standard","volume":"5","author":"K. R. S. Yaira","year":"2019","journal-title":"Digital Communications and Networks"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"volume-title":"eXtensible Access Control Markup Language XACML Version 3.0","year":"2013","author":"X. Oasis","key":"5"},{"first-page":"36","article-title":"ABAC conceptual graph model for composite web services","author":"D. Nabil","key":"6"},{"issue":"6","key":"7","first-page":"969","article-title":"A novel access control specification language and its permission classification","volume":"41","author":"Y. Luo","year":"2018","journal-title":"Journal of Computers"},{"issue":"2","key":"8","first-page":"439","article-title":"Access control policy specification language based on metamodel","volume":"31","author":"Y. Lu","year":"2020","journal-title":"Journal of Software"},{"first-page":"404","article-title":"Mining least privilege attribute based access control policies","author":"M. W. Sander","key":"9"},{"first-page":"25","article-title":"PolTree: a data structure for making efficient access decisions in ABAC","author":"R. Nath","key":"10"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101957"},{"volume-title":"A Retrieval Method Constructed By Access Control With Priority Policy","year":"2018","author":"H. H. Li","key":"12"},{"issue":"11","key":"13","first-page":"2943","article-title":"Policy retrieval method based on sign","volume":"36","author":"J. S. Zhou","year":"2015","journal-title":"Computer Engineering and Design"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.3390\/s20061741"},{"issue":"10","key":"15","first-page":"1","article-title":"Access control policy retrieval method based on attribute grouping","volume":"37","author":"M. R. Huang","year":"2019","journal-title":"Application Research of Computers"},{"first-page":"518","article-title":"Implementing and managing policy rules in attribute based access control","author":"V. Hu","key":"16"},{"issue":"7","key":"17","first-page":"1681","article-title":"A survey of technologies in attribute-based access control scheme","volume":"40","author":"L. Fang","year":"2017","journal-title":"Chinese Journal of Computers"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0317-1"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2951687"},{"first-page":"112","article-title":"Attribute-based access control with dynamic trust in a hybrid cloud computing environment","author":"Z. Y. Zhao","key":"20"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5582921.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5582921.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5582921.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T22:20:25Z","timestamp":1617661225000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5582921\/"}},"subtitle":[],"editor":[{"given":"Zhe-Li","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,4,4]]},"references-count":20,"alternative-id":["5582921","5582921"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5582921","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,4,4]]}}}