{"id":"https://openalex.org/W1980403069","doi":"https://doi.org/10.1109/trustcom.2014.42","title":"FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing","display_name":"FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W1980403069","doi":"https://doi.org/10.1109/trustcom.2014.42","mag":"1980403069"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2014.42","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100433508","display_name":"Yu Zhang","orcid":"https://orcid.org/0000-0002-2052-2231"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China","Science and Technology on Information Assurance Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Information Assurance Laboratory, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029762126","display_name":"Lan Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lan Deng","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089732639","display_name":"Qing Zhou","orcid":"https://orcid.org/0000-0002-0478-176X"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Zhou","raw_affiliation_strings":["Science and Technology on Information Assurance Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Information Assurance Laboratory, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.751,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":17,"citation_normalized_percentile":{"value":0.785419,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":null,"issue":null,"first_page":"310","last_page":"319"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.44762796},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data Sharing","score":0.41187}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.84327185},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8284639},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6945259},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.626311},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.61362845},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5131174},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.50230765},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4968169},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.44895753},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.44762796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4228465},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.41591024},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.41187},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27626055},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08314943},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2014.42","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.59,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":32,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1511886987","https://openalex.org/W1546886278","https://openalex.org/W1592092778","https://openalex.org/W1847647515","https://openalex.org/W1942572371","https://openalex.org/W1965387389","https://openalex.org/W1976420017","https://openalex.org/W1979960234","https://openalex.org/W1993341076","https://openalex.org/W2019672983","https://openalex.org/W2058410460","https://openalex.org/W2076046175","https://openalex.org/W2086042811","https://openalex.org/W2087000693","https://openalex.org/W2090244259","https://openalex.org/W2106116277","https://openalex.org/W2108072891","https://openalex.org/W2109026747","https://openalex.org/W2114296561","https://openalex.org/W2116626915","https://openalex.org/W2118875948","https://openalex.org/W2134894205","https://openalex.org/W2138001464","https://openalex.org/W2152688060","https://openalex.org/W2166471894","https://openalex.org/W2313383357","https://openalex.org/W2383201009","https://openalex.org/W3128663643","https://openalex.org/W66767074","https://openalex.org/W94784130"],"related_works":["https://openalex.org/W618293728","https://openalex.org/W4286615217","https://openalex.org/W4285408982","https://openalex.org/W4231184955","https://openalex.org/W2788012436","https://openalex.org/W2374784346","https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W2291845669","https://openalex.org/W200604156"],"abstract_inverted_index":{"In":[0,48],"the":[1,12,17,53,100,103,114,130,141,150,157,176,180],"past":[2],"few":[3],"years,":[4],"cloud":[5,44,61,110,192],"computing":[6],"has":[7,113],"emerged":[8],"as":[9,22],"one":[10],"of":[11,57,97,116,159],"most":[13],"influential":[14],"paradigms":[15],"in":[16,60,109,140],"IT":[18],"industry.":[19],"As":[20],"promising":[21],"it":[23],"is,":[24],"this":[25,49],"paradigm":[26],"brings":[27],"forth":[28],"many":[29],"new":[30],"challenges":[31],"for":[32,46,80,191],"data":[33,41,58],"security":[34,56],"because":[35],"users":[36],"have":[37],"to":[38,51,128],"outsource":[39],"sensitive":[40],"on":[42,74,149],"untrusted":[43],"servers":[45],"sharing.":[47],"paper,":[50],"guarantee":[52],"confidentiality":[54],"and":[55,67,135,168,179,189],"sharing":[59],"environment,":[62,111],"we":[63,138,161],"propose":[64],"a":[65,163,169],"Flexible":[66],"Efficient":[68],"Access":[69],"Control":[70],"Scheme":[71],"(FEACS)":[72],"based":[73,148],"Attribute-Based":[75],"Encryption,":[76],"which":[77],"is":[78,90,126,146,187],"suitable":[79],"fine-grained":[81],"access":[82,131],"control.":[83],"Compared":[84],"with":[85,118,172],"existing":[86,173],"state-of-the-art":[87],"schemes,":[88],"FEACS":[89,112,145],"more":[91],"practical":[92],"by":[93],"following":[94],"functions.":[95],"First":[96],"all,":[98],"considering":[99],"factor":[101],"that":[102,144,184],"user":[104],"membership":[105,120],"may":[106],"change":[107],"frequently":[108],"capability":[115],"coping":[117],"dynamic":[119],"efficiently.":[121,136],"Secondly,":[122],"full":[123],"logic":[124],"expression":[125],"supported":[127],"make":[129],"policy":[132],"described":[133],"accurately":[134],"Besides,":[137],"prove":[139,183],"standard":[142],"model":[143],"secure":[147],"Decisional":[151],"Bilinear":[152],"Diffie-Hellman":[153],"assumption.":[154],"To":[155],"evaluate":[156],"practicality":[158],"FEACS,":[160],"provide":[162],"detailed":[164],"theoretical":[165,177],"performance":[166],"analysis":[167,178],"simulation":[170],"comparison":[171],"schemes.":[174],"Both":[175],"experimental":[181],"results":[182],"our":[185],"scheme":[186],"efficient":[188],"effective":[190],"environment.":[193]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1980403069","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3}],"updated_date":"2024-12-10T04:27:58.312332","created_date":"2016-06-24"}