{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T11:50:40Z","timestamp":1726487440630},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100008871","name":"Yunnan Provincial Science and Technology Department","doi-asserted-by":"publisher","award":["202001AS070031"],"id":[{"id":"10.13039\/501100008871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61763048","71972165"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1016\/j.asoc.2022.108423","type":"journal-article","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T02:46:01Z","timestamp":1641955561000},"page":"108423","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":42,"special_numbering":"C","title":["A medical big data access control model based on fuzzy trust prediction and regression analysis"],"prefix":"10.1016","volume":"117","author":[{"given":"Rong","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Zhenxing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"11","key":"10.1016\/j.asoc.2022.108423_b1","first-page":"75","article-title":"Patient-oriented privacy protection access control model for his","volume":"31","author":"Huo","year":"2014","journal-title":"Comput. Appl. Softw."},{"key":"10.1016\/j.asoc.2022.108423_b2","article-title":"Multimodal infant brain segmentation by fuzzy-informed deep learning","author":"Ding","year":"2021","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"2","key":"10.1016\/j.asoc.2022.108423_b3","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","article-title":"Big data: A survey","volume":"19","author":"Chen","year":"2014","journal-title":"Mob. Netw. Appl."},{"key":"10.1016\/j.asoc.2022.108423_b4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4137\/BII.S31559","article-title":"Big data application in biomedical research and health care: A literature review","volume":"8","author":"Luo","year":"2016","journal-title":"Biomed. Inform. Insight"},{"issue":"1","key":"10.1016\/j.asoc.2022.108423_b5","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1016\/j.asoc.2009.12.023","article-title":"A hybrid model combining case-based reasoning and fuzzy decision tree for medical data classification","volume":"11","author":"Chin-Yuan","year":"2011","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2022.108423_b6","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.asoc.2017.02.033","article-title":"A multi-granulation decision-theoretic rough set method for distributed fc-decision information systems: An application in medical diagnosis","volume":"56","author":"Zhaowen","year":"2017","journal-title":"Appl. Soft Comput."},{"issue":"7","key":"10.1016\/j.asoc.2022.108423_b7","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TNNLS.2018.2872974","article-title":"Shared nearest-neighbor quantum game-based attribute reduction with hierarchical coevolutionary spark and its application in consistent segmentation of neonatal cerebral cortical surfaces","volume":"30","author":"Ding","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"7","key":"10.1016\/j.asoc.2022.108423_b8","doi-asserted-by":"crossref","first-page":"2744","DOI":"10.1109\/TCYB.2018.2834390","article-title":"Deep neuro-cognitive co-evolution for fuzzy attribute reduction by quantum leaping PSO with nearest-neighbor memeplexes","volume":"49","author":"Ding","year":"2018","journal-title":"IEEE Trans. Cybern."},{"issue":"2","key":"10.1016\/j.asoc.2022.108423_b9","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.ijmedinf.2010.11.005","article-title":"Views on health information sharing and privacy from primary care practices using electronic medical records","volume":"80","author":"Perera","year":"2011","journal-title":"Int. J. Med. Inform."},{"key":"10.1016\/j.asoc.2022.108423_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijinfomgt.2020.102078","article-title":"Big data management in healthcare: Adoption challenges and implications","volume":"53","author":"Chen","year":"2020","journal-title":"Int. J. Inf. Manage."},{"key":"10.1016\/j.asoc.2022.108423_b11","series-title":"A Review of Cyber Security Incidents in 2019(International)","year":"2020"},{"key":"10.1016\/j.asoc.2022.108423_b12","unstructured":"Zijing Guo, Yuchuan Luo, Zhiping Cai, et al., Overview of Privacy Protection Technology of Big Data in healthcare, J. Front. Comput. Sci. Technol. 1\u201319."},{"key":"10.1016\/j.asoc.2022.108423_b13","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.future.2020.03.039","article-title":"Analysis of healthcare big data","volume":"109","author":"Lv","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2022.108423_b14","series-title":"An Empirical Study on the Effectiveness of Penalty Deterrence","author":"Liu","year":"2014"},{"key":"10.1016\/j.asoc.2022.108423_b15","series-title":"Proceedings of the International Conference on Autonomic and Trusted Computing, F","article-title":"Fuzzy regression based trust prediction in service-oriented applications","author":"Li","year":"2009"},{"issue":"3","key":"10.1016\/j.asoc.2022.108423_b16","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1007\/s10844-012-0205-8","article-title":"Multi-level delegations with trust management in access control systems","volume":"39","author":"Li","year":"2012","journal-title":"J. Intell. Inf. Syst."},{"issue":"11","key":"10.1016\/j.asoc.2022.108423_b17","doi-asserted-by":"crossref","first-page":"4547","DOI":"10.1007\/s12652-018-1138-z","article-title":"Trust based access control model for securing electronic healthcare system","volume":"10","author":"Singh","year":"2019","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"10.1016\/j.asoc.2022.108423_b18","series-title":"A Novel Trust Based Access Control Model for Cloud Environment, New Delhi, F","author":"Behera","year":"2017"},{"issue":"9","key":"10.1016\/j.asoc.2022.108423_b19","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/35.312842","article-title":"Access control: principle and practice","volume":"32","author":"Sandhu","year":"1994","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.asoc.2022.108423_b20","unstructured":"D. Ferraiolo, J. Cugini, D.R. Kuhn, Role-based access control (RBAC): Features and motivations, in: Proceedings of the Proceedings of 11th Annual Computer Security Application Conference, F, 1995."},{"key":"10.1016\/j.asoc.2022.108423_b21","series-title":"Role-Based Access Control","author":"Ferraiolo","year":"2003"},{"key":"10.1016\/j.asoc.2022.108423_b22","doi-asserted-by":"crossref","unstructured":"C. Uikey, D.S. Bhilare, TrustRBAC: Trust role based access control model in multi-domain cloud environments, in: Proceedings of the 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC), F 17-19 Aug. 2017, 2017.","DOI":"10.1109\/ICOMICON.2017.8279087"},{"key":"10.1016\/j.asoc.2022.108423_b23","unstructured":"M.H. Yarm, K. Sartipi, D.G. Down, Behavior-Based Access Control for Distributed Healthcare Environment, in: Proceedings of the 2008 21st IEEE International Symposium on Computer-Based Medical Systems, F 17-19 June 2008, 2008."},{"key":"10.1016\/j.asoc.2022.108423_b24","doi-asserted-by":"crossref","unstructured":"M. Wilikens, S. Feriti, A. Sanna, et al., A context-related authorization and access control method based on RBAC, in: Proceedings of the Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, F, 2002.","DOI":"10.1145\/507711.507730"},{"issue":"08","key":"10.1016\/j.asoc.2022.108423_b25","first-page":"1983","article-title":"Tak-role base access control mode base base on dynamic multiplefactorial trust evaluation","volume":"24","author":"Zhang","year":"2018","journal-title":"Comput. Intergraded Manuf. Syst."},{"key":"10.1016\/j.asoc.2022.108423_b26","series-title":"Formalising Trust as a Computational Concept","author":"Marsh","year":"1994"},{"key":"10.1016\/j.asoc.2022.108423_b27","doi-asserted-by":"crossref","unstructured":"S. Chakraborty, I. Ray, TrustBAC: integrating trust relationships into the RBAC model for access control in open systems, in: Proceedings of the Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, F, 2006.","DOI":"10.1145\/1133058.1133067"},{"key":"10.1016\/j.asoc.2022.108423_b28","series-title":"Proceedings of the International Conference on Trust, Privacy and Security in Digital Business, F","article-title":"Towards an ontology of trust","author":"Viljanen","year":"2005"},{"issue":"4","key":"10.1016\/j.asoc.2022.108423_b29","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/CC.2014.6827577","article-title":"MTBAC: A mutual trust based access control model in cloud computing","volume":"11","author":"Lin","year":"2014","journal-title":"China Commun."},{"issue":"2","key":"10.1016\/j.asoc.2022.108423_b30","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1016\/j.asoc.2006.11.002","article-title":"Fuzzy trust evaluation and credibility development in multi-agent systems","volume":"7","author":"Schmidt","year":"2007","journal-title":"Appl. Soft Comput."},{"issue":"12","key":"10.1016\/j.asoc.2022.108423_b31","first-page":"190","article-title":"Risk-adaptive access control model for big data in healthcare","volume":"36","author":"Hui","year":"2015","journal-title":"J. Commun."},{"key":"10.1016\/j.asoc.2022.108423_b32","series-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China","first-page":"406","article-title":"Quantified risk-adaptive access control for patient privacy protection in health information systems","author":"Wang","year":"2011"},{"issue":"S1","key":"10.1016\/j.asoc.2022.108423_b33","first-page":"51","article-title":"Trust-degree based fine-grained RBAC framework","volume":"30","author":"Liu","year":"2009","journal-title":"J. Commun."},{"key":"10.1016\/j.asoc.2022.108423_b34","series-title":"Proceedings of the 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), F","article-title":"Etaf: An extended trust antecedents framework for trust prediction","author":"Guo","year":"2014"},{"key":"10.1016\/j.asoc.2022.108423_b35","series-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining, F","article-title":"Tapping community memberships and devising a novel homophily modeling approach for trust prediction","author":"Parikh","year":"2018"},{"key":"10.1016\/j.asoc.2022.108423_b36","doi-asserted-by":"crossref","first-page":"2187","DOI":"10.1109\/ACCESS.2017.2654378","article-title":"Towards a trust prediction framework for cloud services based on PSO-driven neural network","volume":"5","author":"Mao","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2022.108423_b37","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2011.12.021","article-title":"A trust prediction framework in rating-based experience sharing social networks without a web of trust","volume":"191","author":"Kim","year":"2012","journal-title":"Inform. Sci."},{"issue":"6","key":"10.1016\/j.asoc.2022.108423_b38","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1109\/TFUZZ.2020.2975152","article-title":"Multigranulation supertrust model for attribute reduction","volume":"29","author":"Ding","year":"2020","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"10.1016\/j.asoc.2022.108423_b39","doi-asserted-by":"crossref","unstructured":"P.W. Fong, Relationship-based access control: protection model and policy language, in: Proceedings of the Proceedings of the First ACM Conference on Data and Application Security and Privacy, F, 2011.","DOI":"10.1145\/1943513.1943539"},{"key":"10.1016\/j.asoc.2022.108423_b40","series-title":"Probability Theory and Mathematical Statistics","author":"Wang","year":"1962"},{"key":"10.1016\/j.asoc.2022.108423_b41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JCS-2012-0454","article-title":"Behavior-based access control for distributed healthcare systems","volume":"21","author":"Yarm","year":"2013","journal-title":"J. Comput. Secur."},{"issue":"5","key":"10.1016\/j.asoc.2022.108423_b42","doi-asserted-by":"crossref","first-page":"2117","DOI":"10.1007\/s12652-019-01240-2","article-title":"An adaptive mutual trust based access control model for electronic healthcare system","volume":"11","author":"Singh","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"04","key":"10.1016\/j.asoc.2022.108423_b43","doi-asserted-by":"crossref","DOI":"10.1142\/S0218843017500034","article-title":"Multi-factor synthesis decision-making for trust-based access control on cloud","volume":"26","author":"Riad","year":"2017","journal-title":"Int. J. Coop. Inf. Syst."},{"issue":"19","key":"10.1016\/j.asoc.2022.108423_b44","doi-asserted-by":"crossref","first-page":"28309","DOI":"10.1007\/s11042-019-07923-4","article-title":"ITrust: identity and trust based access control model for healthcare system security","volume":"78","author":"Singh","year":"2019","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.asoc.2022.108423_b45","doi-asserted-by":"crossref","unstructured":"W.B. Daoud, A. Meddeb-Makhlouf, F. Zarai, A Trust-based Access Control Scheme for e-Health Cloud, in: Proceedings of the 2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA), F 28 Oct.-1 Nov. 2018, 2018.","DOI":"10.1109\/AICCSA.2018.8612786"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494622000084?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494622000084?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T03:18:15Z","timestamp":1716607095000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494622000084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":45,"alternative-id":["S1568494622000084"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2022.108423","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2022,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A medical big data access control model based on fuzzy trust prediction and regression analysis","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2022.108423","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"108423"}}