{"id":"https://openalex.org/W2944159053","doi":"https://doi.org/10.1109/sose.2019.00062","title":"Policy-Based Access Control for Robotic Applications","display_name":"Policy-Based Access Control for Robotic Applications","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2944159053","doi":"https://doi.org/10.1109/sose.2019.00062","mag":"2944159053"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/sose.2019.00062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103180874","display_name":"Yi Zong","orcid":"https://orcid.org/0000-0003-1262-3558"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Zong","raw_affiliation_strings":["Key Laboratory of High-Confidence Software Technologies (Ministry of Education), Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of High-Confidence Software Technologies (Ministry of Education), Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021450973","display_name":"Yao Guo","orcid":"https://orcid.org/0000-0001-5064-5286"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yao Guo","raw_affiliation_strings":["Key Laboratory of High-Confidence Software Technologies (Ministry of Education), Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of High-Confidence Software Technologies (Ministry of Education), Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101636662","display_name":"Xiangqun Chen","orcid":"https://orcid.org/0000-0002-7366-5906"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangqun Chen","raw_affiliation_strings":["Key Laboratory of High-Confidence Software Technologies (Ministry of Education), Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of High-Confidence Software Technologies (Ministry of Education), Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.071,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.888697,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9944,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.945823},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.49509302}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.945823},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7100879},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6861844},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.62327117},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5794894},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5683749},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5469704},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.49509302},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.45982695},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.44091097},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4360584},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.41737607},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1532659},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14782476},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/sose.2019.00062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.56,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W146651671","https://openalex.org/W1981404401","https://openalex.org/W2002217674","https://openalex.org/W2097171586","https://openalex.org/W2133495469","https://openalex.org/W2138001464","https://openalex.org/W2318055712","https://openalex.org/W2552237521","https://openalex.org/W2566780507","https://openalex.org/W2901136733","https://openalex.org/W4243561742","https://openalex.org/W4302378693"],"related_works":["https://openalex.org/W2374393728","https://openalex.org/W2373984226","https://openalex.org/W2364540050","https://openalex.org/W2361337511","https://openalex.org/W2358774039","https://openalex.org/W2353815999","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W2124367090","https://openalex.org/W1513229083"],"abstract_inverted_index":{"With":[0],"the":[1,22,39,50,125,134],"wide":[2],"application":[3],"of":[4,16,42],"modern":[5],"robots,":[6,32],"more":[7],"concerns":[8],"have":[9,34],"been":[10,35],"raised":[11],"on":[12,30,88],"security":[13,40],"and":[14,19,116,139,143],"privacy":[15,74],"robotic":[17],"systems":[18],"applications.":[20],"Although":[21],"Robot":[23],"Operating":[24],"System":[25],"(ROS)":[26],"is":[27],"commonly":[28],"used":[29],"different":[31],"there":[33],"few":[36],"work":[37],"considering":[38],"aspects":[41],"ROS.":[43],"As":[44],"ROS":[45,86,99,138],"does":[46],"not":[47],"employ":[48],"even":[49],"basic":[51],"permission":[52,117,130],"control":[53,83,93,108],"mechanism,":[54],"applications":[55],"can":[56,112],"access":[57,82,92,107],"any":[58],"resources":[59],"without":[60],"limitation,":[61],"which":[62],"could":[63],"result":[64],"in":[65,137],"equipment":[66],"damage,":[67],"harm":[68],"to":[69,100,127],"human,":[70],"as":[71,73],"well":[72],"leakage.":[75],"In":[76],"this":[77],"paper":[78],"we":[79,97],"propose":[80],"an":[81,89,102],"mechanism":[84,122],"for":[85,106],"based":[87],"extended":[90],"policy-based":[91],"(PBAC)":[94],"model.":[95],"Specifically,":[96],"extend":[98],"add":[101],"additional":[103],"node":[104],"dedicated":[105],"so":[109],"that":[110],"it":[111],"provide":[113],"user":[114],"identity":[115],"management":[118],"services.":[119],"The":[120],"proposed":[121,135],"also":[123],"allows":[124],"administrator":[126],"revoke":[128],"a":[129],"dynamically.":[131],"We":[132],"implemented":[133],"method":[136],"demonstrated":[140],"its":[141],"applicability":[142],"performance":[144],"through":[145],"several":[146],"case":[147],"studies.":[148]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2944159053","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2024-12-06T21:23:54.171732","created_date":"2019-05-16"}