{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T22:29:25Z","timestamp":1770157765654,"version":"3.49.0"},"reference-count":15,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T00:00:00Z","timestamp":1572912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,2,6]]},"abstract":"<jats:p>\n                    Access control is an important mechanism to protect sensitive information and relational system resources. The traditional access control model (TACM), such as DAC, MAC, RBAC, etc., is no longer suitable for open network due to the lack of dynamic permission management. The increasing network nodes make the information storage and resource access becoming distributed. The traditional access control model has the characteristics of low adaptive ability and single deployment and application mode due to the centralized management mode. Therefore, this access control environment inevitably puts access control pressure on access control authorization. In order to overcome the shortcomings of traditional access control model, a new access control model named\n                    <jats:italic>DMPAC<\/jats:italic>\n                    (Distributed management of permission for access control model) is proposed in the paper. The authorization mechanism of the model has a distributed and dynamic management access permission, and all nodes covered by the model have the opportunity to participate in the execution of access and control. The model\n                    <jats:italic>DMPAC<\/jats:italic>\n                    provides the benefits of traditional access control models in terms of secure access and dynamic management. We also describe the framework and execution process of the model and the application of\n                    <jats:italic>DMPAC<\/jats:italic>\n                    in access control. At last, we will present some experimental results to show that while maintaining the effectiveness of distributed access control through the management of access permissions,\n                    <jats:italic>DMPAC<\/jats:italic>\n                    can achieve the performance of traditional access control models.\n                  <\/jats:p>","DOI":"10.3233\/jifs-179517","type":"journal-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:31:13Z","timestamp":1573219873000},"page":"1539-1548","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":6,"title":["Distributed management of permission for access control model"],"prefix":"10.1177","volume":"38","author":[{"given":"Fangbo","family":"Cai","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing, China"}]},{"given":"Jingsha","family":"He","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing, China"}]},{"given":"Zulfiqar","family":"Ali Zardari","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing, China"}]},{"given":"Song","family":"Han","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2019,11,5]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"4","article-title":"A Generalized Temporal Role-Based Access Control Model[M]","volume":"2003","author":"Joshi J.B.D.","unstructured":"JoshiJ.B.D., BertinoE., LatifU., et al., A Generalized Temporal Role-Based Access Control Model[M], A generalized temporal role based access control model for developing secure systems 2003, 4\u201323.","journal-title":"A generalized temporal role based access control model for developing secure systems"},{"issue":"1","key":"e_1_3_1_3_2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/775265.775268","article-title":"Protection","volume":"8","author":"Lampson Butler W.","year":"1974","unstructured":"LampsonButler W., Protection, ACM SIGOPS Operating Systems Review 8(1) (1974), 18\u201324.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"AlwehaibiA. and AtayM. A Rule-Based Relational XML Access Control Model in the Presence of Authorization Conflicts[M] Information Technology - New Generations 2018.","DOI":"10.1007\/978-3-319-54978-1_43"},{"issue":"2","key":"e_1_3_1_5_2","first-page":"1","article-title":"Survey of access control models and technologies for cloud computing[J]","volume":"2018","author":"Cai F.","unstructured":"CaiF., ZhuN., HeJ., et al., Survey of access control models and technologies for cloud computing[J], Cluster Computing 2018(2), 1\u201312.","journal-title":"Cluster Computing"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"OuaddahA. ElkalamA.A. and OuahmanA.A. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT[M] Europe and MENA Cooperation Advances in Information and Communication Technologies 2017.","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"e_1_3_1_7_2","unstructured":"ApisframeworksM. and ComponentsM.W. Distributed Component Object Model[M] Encyclopedia of Database Systems 2009."},{"key":"e_1_3_1_8_2","unstructured":"ChangpingS. Common object request broker architecture[J] Computer integrated manufacturing system 1998."},{"key":"e_1_3_1_9_2","doi-asserted-by":"crossref","unstructured":"WhiteJ. SchmidtD.C. and GokhaleA. Simplifying Autonomic Enterprise Java Bean ApplicationsViaModel-Driven Development: A Case Study[C] International Conference on Model Driven Engineering Languages & Systems 2005.","DOI":"10.1007\/11557432_45"},{"key":"e_1_3_1_10_2","unstructured":"ChinniciR. and SunM. Web Services Description Language (WSDL) Version 1.2[M] Encyclopedia of Social Network Analysis and Mining 2003."},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","unstructured":"BeckerM.Y. and SewellP. Cassandra: Distributed access control policies with tunable expressiveness[M]. 2004.","DOI":"10.1109\/POLICY.2004.1309162"},{"key":"e_1_3_1_12_2","unstructured":"DeinhartK. Method and system for advanced role-based access control in distributed and centralized computer systems[J] Internatl Business Mach Corp & Lt Ibm & Gt 1999."},{"issue":"4","key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1364\/JON.4.000213","article-title":"Distributed medium-access-control protocol for an optical-packet-switched ringnetwork supporting variable-length packets[J]","volume":"4","author":"Nielsen M.","year":"2005","unstructured":"NielsenM., NordM. and BjornstadS., Distributed medium-access-control protocol for an optical-packet-switched ringnetwork supporting variable-length packets[J], Journal of Optical Networking 4(4) (2005), 213\u2013225.","journal-title":"Journal of Optical Networking"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1125808.1125810","article-title":"Model driven security: From UML models to access control infrastructures[J]","volume":"15","author":"Basin D.","year":"2006","unstructured":"BasinD. and LodderstedtT., Model driven security: From UML models to access control infrastructures[J], Acm Transactions on Software Engineering & Methodology 15 (2006), 39\u201391.","journal-title":"Acm Transactions on Software Engineering & Methodology"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TSG.2012.2224389","article-title":"A decentralized security framework for data aggregation and access control in smart grids[J]","volume":"4","author":"Ruj S.","year":"2013","unstructured":"RujS. and NayakA., A decentralized security framework for data aggregation and access control in smart grids[J], IEEE Transactions on Smart Grid 4 (2013), 196\u2013205.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","unstructured":"R\u00f6scheisenM. and WinogradT. A network-centric design for relationship-based security and access control[M]. 1997.","DOI":"10.3233\/JCS-1997-5306"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179517","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179517","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T10:31:02Z","timestamp":1770114662000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179517"}},"subtitle":[],"editor":[{"given":"Mohamed","family":"Elhoseny","sequence":"additional","affiliation":[]},{"given":"X.","family":"Yuan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,11,5]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2,6]]}},"alternative-id":["10.3233\/JIFS-179517"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179517","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,5]]}}}