{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T10:18:03Z","timestamp":1725445083215},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659546","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:11:49Z","timestamp":1552950709000},"page":"254-259","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Protection Method Based on Access Control"],"prefix":"10.23919","author":[{"given":"Xin","family":"Qiao","sequence":"first","affiliation":[]},{"given":"Lixiaoyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Suyun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2414740.2414746"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168590"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2494443"},{"journal-title":"Web Privacy with P3P","year":"2002","author":"faith cranor","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1180367.1180378"},{"journal-title":"Role-Based Access Control [M]","year":"2007","author":"ferraiolo","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1045\/november96-miller"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2307729.2307796"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2008.022489"},{"journal-title":"Partial Order Databases","year":"1996","author":"ronald raymond","key":"ref9"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2018,11,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659546.pdf?arnumber=8659546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:20:32Z","timestamp":1598221232000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659546\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659546","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}