{"id":"https://openalex.org/W2107963461","doi":"https://doi.org/10.1109/icdim.2009.5356797","title":"Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment","display_name":"Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2107963461","doi":"https://doi.org/10.1109/icdim.2009.5356797","mag":"2107963461"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2009.5356797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052673713","display_name":"Asmidar Abu Bakar","orcid":"https://orcid.org/0000-0001-7406-4101"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"funder","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Asmidar Abu Bakar","raw_affiliation_strings":["College of Information Technology, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102704870","display_name":"Roslan Ismail","orcid":"https://orcid.org/0000-0003-2746-0683"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"funder","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Roslan Ismail","raw_affiliation_strings":["College of Information Technology, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014561100","display_name":"Abdul Rahim Ahmad","orcid":"https://orcid.org/0000-0001-6305-0660"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"funder","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Abdul Rahim Ahmad","raw_affiliation_strings":["College of Information Technology, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030867641","display_name":"Jamalul-Lail Abdul","orcid":null},"institutions":[{"id":"https://openalex.org/I891303086","display_name":"MIMOS (Malaysia)","ror":"https://ror.org/01k94e681","country_code":"MY","type":"government","lineage":["https://openalex.org/I891303086"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Jamalul-Lail Abdul","raw_affiliation_strings":["Manan, MIMOS Berhad, Malaysia"],"affiliations":[{"raw_affiliation_string":"Manan, MIMOS Berhad, Malaysia","institution_ids":["https://openalex.org/I891303086"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063624349","display_name":"Jamilin Jais","orcid":null},"institutions":[{"id":"https://openalex.org/I240666556","display_name":"Imam Mohammad ibn Saud Islamic University","ror":"https://ror.org/05gxjyb39","country_code":"SA","type":"funder","lineage":["https://openalex.org/I240666556"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Jamilin Jais","raw_affiliation_strings":["Imam Muhammad Ibn Saud Islamic, University, Riyadh"],"affiliations":[{"raw_affiliation_string":"Imam Muhammad Ibn Saud Islamic, University, Riyadh","institution_ids":["https://openalex.org/I240666556"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.987,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.779423,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9955,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75769985},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7249752},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.624796},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.621867},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5919333},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.5608686},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.51165444},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4833755},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.47640052},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.41321605},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.10469854},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10119566},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2009.5356797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W1589114032","https://openalex.org/W1599937967","https://openalex.org/W2099385026","https://openalex.org/W2140060493","https://openalex.org/W2156200189","https://openalex.org/W2157427303","https://openalex.org/W2169846116","https://openalex.org/W2276497559","https://openalex.org/W2405265072","https://openalex.org/W2535444957","https://openalex.org/W2542603226","https://openalex.org/W4300933301"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2771454953","https://openalex.org/W2768875466","https://openalex.org/W2551975114","https://openalex.org/W2062688728","https://openalex.org/W2061231656","https://openalex.org/W2027636740","https://openalex.org/W2025838880","https://openalex.org/W1591014886","https://openalex.org/W1123412569"],"abstract_inverted_index":{"Mobile":[0],"ad-hoc":[1],"network":[2,5,52,100],"is":[3,22,37,53],"a":[4,76,82],"that":[6,59,89],"can":[7],"dynamically":[8],"setup":[9],"on":[10],"the":[11,35,67,99,110,113,119],"fly":[12],"by":[13,84],"mobile":[14,43],"nodes.":[15,44],"Due":[16],"to":[17,38,47,56,62,70,91,95,108],"its":[18,48],"unique":[19],"characteristics,":[20],"it":[21],"becoming":[23],"an":[24,93],"attractive":[25],"choice":[26],"for":[27],"commercial":[28],"and":[29,33,127],"also":[30,128],"military":[31],"application":[32],"among":[34,42],"used":[36],"support":[39],"information":[40,64,97],"sharing":[41],"However":[45],"due":[46],"borderless":[49],"infrastructure,":[50],"this":[51,72],"highly":[54],"susceptible":[55],"adversaries":[57],"nodes,":[58],"illegally":[60],"able":[61,90],"access":[63,94],"shared":[65],"in":[66,98],"network.":[68],"Hence":[69],"overcome":[71],"problem":[73],"we":[74],"proposed":[75],"Group":[77],"Based":[78],"Access":[79],"Control":[80],"scheme,":[81],"step":[83,85],"process":[86],"or":[87],"protocol":[88,116],"make":[92],"share":[96],"secure.":[101],"We":[102],"use":[103,111],"emergency":[104],"rescue":[105],"mission":[106],"scenario":[107],"illustrate":[109],"of":[112],"scheme.":[114],"The":[115],"created":[117],"meets":[118],"security":[120],"properties":[121],"such":[122],"as":[123],"data":[124],"confidentiality,":[125],"integrity":[126],"non-repudiation.":[129]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2107963461","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-04-21T12:21:08.511158","created_date":"2016-06-24"}