{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T11:36:51Z","timestamp":1725017811087},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T00:00:00Z","timestamp":1536796800000},"content-version":"am","delay-in-days":408,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61303215","61373107"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011102","name":"EU FP7 SMARTER project","doi-asserted-by":"publisher","award":["FP7-PEOPLE-2013-IAPP-610675"],"id":[{"id":"10.13039\/100011102","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Advanced Engineering Informatics"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1016\/j.aei.2016.12.001","type":"journal-article","created":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T02:00:33Z","timestamp":1482976833000},"page":"374-387","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["An encryption approach for product assembly models"],"prefix":"10.1016","volume":"33","author":[{"given":"X.T.","family":"Cai","sequence":"first","affiliation":[]},{"given":"S.","family":"Wang","sequence":"additional","affiliation":[]},{"given":"X.","family":"Lu","sequence":"additional","affiliation":[]},{"given":"W.D.","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.aei.2016.12.001_b0005","doi-asserted-by":"crossref","DOI":"10.1115\/1.4028510","article-title":"Statistical predictive modeling and compensation of geometric deviations of three-dimensional printed products","volume":"136","author":"Huang","year":"2014","journal-title":"J. Manuf. Sci. Eng."},{"key":"10.1016\/j.aei.2016.12.001_b0010","doi-asserted-by":"crossref","unstructured":"S. Hauck, S. Knol, Data security for web-based CAD, in: Design Automation Conference, San Francisco, 1998, pp. 788\u2013793.","DOI":"10.1145\/277044.277242"},{"key":"10.1016\/j.aei.2016.12.001_b0015","series-title":"Cloud Manufacturing (Springer Series in Advanced Manufacturing","doi-asserted-by":"crossref","author":"Li","year":"2013","DOI":"10.1007\/978-1-4471-4935-4"},{"issue":"6","key":"10.1016\/j.aei.2016.12.001_b0020","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1299\/jamdsm.6.324","article-title":"Flexible concurrency control for legacy CAD to construct collaborative CAD environment","volume":"3","author":"Cai","year":"2012","journal-title":"J. Adv. Mech. Des., Syst., Manuf."},{"key":"10.1016\/j.aei.2016.12.001_b0025","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.compind.2012.05.001","article-title":"Secure collaboration in global design and supply chain environment: problem analysis and literature review","volume":"63","author":"Zeng","year":"2012","journal-title":"Comput. Ind."},{"key":"10.1016\/j.aei.2016.12.001_b0030","doi-asserted-by":"crossref","unstructured":"J. Stjepandi\u0107, H. Liese, A.J.C., Intellectual Property Protection, Chapter in Concurrent Engineering in the 21st Century, 2015, pp 521\u2013551.","DOI":"10.1007\/978-3-319-13776-6_18"},{"issue":"4","key":"10.1016\/j.aei.2016.12.001_b0035","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/361284.361287","article-title":"On the implementation of security measures in information system","volume":"15","author":"Conway","year":"1972","journal-title":"Commun. ACM"},{"issue":"2","key":"10.1016\/j.aei.2016.12.001_b0040","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Comp."},{"issue":"6","key":"10.1016\/j.aei.2016.12.001_b0045","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/S0306-4379(02)00029-7","article-title":"Task-role-based access control model","volume":"28","author":"Oh","year":"2003","journal-title":"Inf. Syst."},{"key":"10.1016\/j.aei.2016.12.001_b0050","doi-asserted-by":"crossref","unstructured":"J. Park, R. Sandhu, Towards usage control models: beyond traditional access control, in: Proceedingsof the 7th ACM Symposium on Access Control Models and Technologies, 2002, California, pp. 57\u201364.","DOI":"10.1145\/507711.507722"},{"issue":"1","key":"10.1016\/j.aei.2016.12.001_b0055","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/984334.984339","article-title":"The UCONABC usage control model","volume":"7","author":"Park","year":"2004","journal-title":"ACM Trans. Inf. Syst. Sec."},{"key":"10.1016\/j.aei.2016.12.001_b0060","unstructured":"A. Hoeven, O.T. Bosch, R. Leuken, et al., A flexible access control mechanism for CAD frameworks, in: Proceedings of the Conference on European Design Automation, Los Alamito, 1994, pp. 188\u2013193."},{"key":"10.1016\/j.aei.2016.12.001_b0065","doi-asserted-by":"crossref","unstructured":"G. Stevens, V. Wulf, A new dimension in access control: studying maintenance engineering across organizational boundaries, in: Proceedings of 2002 ACM Conference on CSCW, 2002, pp. 196\u2013205.","DOI":"10.1145\/587078.587106"},{"key":"10.1016\/j.aei.2016.12.001_b0070","series-title":"Role-Based Viewing for Secure Collaborative Modeling, Pennsylvania","author":"Cera","year":"2003"},{"key":"10.1016\/j.aei.2016.12.001_b0075","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/S0166-3615(02)00119-7","article-title":"A security model for distributed product data management system","volume":"50","author":"Leong","year":"2003","journal-title":"Comput. Ind."},{"key":"10.1016\/j.aei.2016.12.001_b0080","unstructured":"B. Adrian, B. Steve, An access control framework for multi-user collaborative environment, in: Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, 1999, pp. 140\u2013149."},{"key":"10.1016\/j.aei.2016.12.001_b0085","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.rcim.2006.02.011","article-title":"Dynamic data sharing and security in a collaborative product definition management system","volume":"23","author":"Rouibah","year":"2007","journal-title":"Robot. Comp.-Integ. Manuf."},{"key":"10.1016\/j.aei.2016.12.001_b0090","series-title":"The Research of Security System for Sharing Engineering Drawings","first-page":"319","author":"Chang","year":"2007"},{"key":"10.1016\/j.aei.2016.12.001_b0095","first-page":"91","article-title":"Research on a security model of data in computer supported collaborative design integrated with PDM system","author":"Yao","year":"2007","journal-title":"IITA 2007: Workshop on Intelligent Information Technology Application"},{"issue":"5","key":"10.1016\/j.aei.2016.12.001_b0100","first-page":"731","article-title":"The development of security system for sharing CAD drawings in U-environment","volume":"27","author":"Chang","year":"2008","journal-title":"Comput. Inf."},{"key":"10.1016\/j.aei.2016.12.001_b0105","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.jom.2011.06.003","article-title":"Global supply chain design considerations: mitigating product safety and security risks","volume":"29","author":"Speiera","year":"2011","journal-title":"J. Operat. Manage."},{"key":"10.1016\/j.aei.2016.12.001_b0110","first-page":"406","article-title":"The research of network security mechanism based collaborative design","volume":"421","author":"Xiangand","year":"2012","journal-title":"Adv. Des. Technol."},{"issue":"6","key":"10.1016\/j.aei.2016.12.001_b0115","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1115\/1.2161226","article-title":"Hierarchical role-based viewing for multilevel information security in collaborative CAD","volume":"1","author":"Cera","year":"2006","journal-title":"J. Comp. Inf. Sci. Eng."},{"key":"10.1016\/j.aei.2016.12.001_b0120","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.aei.2005.05.016","article-title":"Multi-level modeling and access control for data sharing in collaborative design","volume":"20","author":"Kim","year":"2006","journal-title":"Adv. Eng. Inf."},{"key":"10.1016\/j.aei.2016.12.001_b0125","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1016\/j.compind.2008.07.006","article-title":"3D streaming based on multi-LOD models for networked collaborative design","volume":"59","author":"Chu","year":"2008","journal-title":"Comput. Ind."},{"key":"10.1016\/j.aei.2016.12.001_b0130","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.rcim.2007.01.005","article-title":"Multi-agent collaborative3Ddesignwithgeometricmodel at different levels of detail","volume":"25","author":"Chu","year":"2009","journal-title":"Robot. Comp.-Integ. Manuf."},{"key":"10.1016\/j.aei.2016.12.001_b0135","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1016\/j.compind.2012.04.003","article-title":"A matrix-based modularization approach for supporting secure collaboration in parametric design","volume":"63","author":"Li","year":"2012","journal-title":"Comput. Ind."},{"issue":"3","key":"10.1016\/j.aei.2016.12.001_b0140","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s12008-012-0145-0","article-title":"Appearance preserving simplification of 3D CAD model with large-scale assembly structures","volume":"6","author":"Kanai","year":"2012","journal-title":"Int. J. Interact. Des. Manuf."},{"issue":"68","key":"10.1016\/j.aei.2016.12.001_b0145","doi-asserted-by":"crossref","first-page":"2335","DOI":"10.1007\/s00170-013-4850-z","article-title":"CAD model simplification for assembly field","volume":"9","author":"Yu","year":"2013","journal-title":"Int. J. Adv. Manuf. Technol."},{"issue":"19","key":"10.1016\/j.aei.2016.12.001_b0150","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s00773-013-0239-9","article-title":"Method to simplify ship outfitting and offshore plant equipment three-dimensional (3-D) computer-aided design (CAD) data for construction of an equipment catalog","volume":"2","author":"Kang","year":"2014","journal-title":"J. Mar. Sci. Technol."},{"key":"10.1016\/j.aei.2016.12.001_b0155","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.cad.2014.03.003","article-title":"Simplification of feature-based 3D CAD assembly data of ship and offshore equipment using quantitative evaluation metrics","volume":"59","author":"Kwon","year":"2015","journal-title":"Comput. Aided Des."},{"key":"10.1016\/j.aei.2016.12.001_b0160","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1016\/j.optcom.2010.09.065","article-title":"Flexible optical encryption with multiple users and multiple security levels","volume":"284","author":"Naveenand","year":"2011","journal-title":"Opt. Commun."},{"key":"10.1016\/j.aei.2016.12.001_b0165","doi-asserted-by":"crossref","first-page":"243","DOI":"10.3233\/ICA-150487","article-title":"Encryption Based Partial Sharing of CAD Models","volume":"22","author":"Cai","year":"2015","journal-title":"Integ. Comp.-Aided Eng."},{"key":"10.1016\/j.aei.2016.12.001_b0170","doi-asserted-by":"crossref","DOI":"10.1115\/1.4030592","article-title":"Customized encryption of computer aided design models for collaboration in cloud manufacturing environment","volume":"137","author":"Cai","year":"2015","journal-title":"J. Manuf. Sci. Eng."}],"container-title":["Advanced Engineering Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1474034616301902?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1474034616301902?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,7]],"date-time":"2024-04-07T22:27:59Z","timestamp":1712528879000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1474034616301902"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":34,"alternative-id":["S1474034616301902"],"URL":"https:\/\/doi.org\/10.1016\/j.aei.2016.12.001","relation":{},"ISSN":["1474-0346"],"issn-type":[{"value":"1474-0346","type":"print"}],"subject":[],"published":{"date-parts":[[2017,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An encryption approach for product assembly models","name":"articletitle","label":"Article Title"},{"value":"Advanced Engineering Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.aei.2016.12.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}