{"id":"https://openalex.org/W2943665807","doi":"https://doi.org/10.1007/978-3-030-22312-0_7","title":"Fine-Grained Access Control in Industrial Internet of Things","display_name":"Fine-Grained Access Control in Industrial Internet of Things","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2943665807","doi":"https://doi.org/10.1007/978-3-030-22312-0_7","mag":"2943665807"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-22312-0_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-22312-0_7","pdf_url":null,"source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://openlib.tugraz.at/5e5cfce96e3d2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020082730","display_name":"Dominik Ziegler","orcid":"https://orcid.org/0000-0002-5930-8216"},"institutions":[{"id":"https://openalex.org/I4210088621","display_name":"Know Center Research GmbH (Austria)","ror":"https://ror.org/004zhad81","country_code":"AT","type":"company","lineage":["https://openalex.org/I4210088621"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Dominik Ziegler","raw_affiliation_strings":["Know Center GmbH, Inffeldgasse 13, 8010, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Know Center GmbH, Inffeldgasse 13, 8010, Graz, Austria","institution_ids":["https://openalex.org/I4210088621"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022394196","display_name":"Josef Sabongui","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Josef Sabongui","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043972928","display_name":"Gerald Palfinger","orcid":"https://orcid.org/0000-0001-6633-858X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gerald Palfinger","raw_affiliation_strings":["A-SIT Secure Information Technology Center Austria, Seidlgasse 22/Top 9, 1030, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"A-SIT Secure Information Technology Center Austria, Seidlgasse 22/Top 9, 1030, Vienna, Austria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020082730"],"corresponding_institution_ids":["https://openalex.org/I4210088621"],"apc_list":null,"apc_paid":null,"fwci":1.1014,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.79517233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7618584036827087},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6552845239639282},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6360191106796265},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5917513370513916},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5671180486679077},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5189751982688904},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.49045702815055847},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48615214228630066},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4098455309867859},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3082484006881714},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.27255573868751526}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7618584036827087},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6552845239639282},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6360191106796265},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5917513370513916},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5671180486679077},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5189751982688904},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.49045702815055847},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48615214228630066},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4098455309867859},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3082484006881714},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27255573868751526}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-030-22312-0_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-22312-0_7","pdf_url":null,"source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},{"id":"pmh:http://openlib.tugraz.at/5e5cfce96e3d2","is_oa":true,"landing_page_url":"http://openlib.tugraz.at/5e5cfce96e3d2","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":null},{"id":"pmh:oai:HAL:hal-03744312v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-03744312","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.91-104, &#x27E8;10.1007/978-3-030-22312-0_7&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:http://openlib.tugraz.at/5e5cfce96e3d2","is_oa":true,"landing_page_url":"http://openlib.tugraz.at/5e5cfce96e3d2","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":null},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320310430","display_name":"TU Graz, Internationale Beziehungen und Mobilit\u00e4tsprogramme","ror":"https://ror.org/00d7xrm67"},{"id":"https://openalex.org/F4320322923","display_name":"Siemens","ror":"https://ror.org/059mq0909"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W86792954","https://openalex.org/W1498316612","https://openalex.org/W1569083856","https://openalex.org/W1993719651","https://openalex.org/W2018840295","https://openalex.org/W2044772384","https://openalex.org/W2065955975","https://openalex.org/W2105103777","https://openalex.org/W2108072891","https://openalex.org/W2113857797","https://openalex.org/W2114896656","https://openalex.org/W2117596926","https://openalex.org/W2138001464","https://openalex.org/W2558090922","https://openalex.org/W2566433365","https://openalex.org/W2618020004","https://openalex.org/W2621530037","https://openalex.org/W2765635759"],"related_works":["https://openalex.org/W4248847356","https://openalex.org/W2744624421","https://openalex.org/W777049646","https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2620043489","https://openalex.org/W4235894667","https://openalex.org/W4292493860","https://openalex.org/W2767823571"],"abstract_inverted_index":{"Putting":[0],"Attribute-Based":[1,32],"Encryption":[2,33],"(ABE)":[3],"to":[4,20],"the":[5,40,45,73,98,123],"test,":[6],"we":[7,23,71,93],"perform":[8],"a":[9,25],"thorough":[10],"performance":[11],"analysis":[12],"of":[13,44,48,75],"ABE":[14,108],"with":[15,78,90,109],"outsourced":[16,110],"decryption.":[17],"In":[18],"order":[19],"do":[21],"so,":[22],"implemented":[24],"purely":[26],"Java":[27],"and":[28,42,54,66,85],"Kotlin":[29],"based":[30],"Ciphertext-Policy":[31],"(CP-ABE)":[34],"system.":[35,103],"We":[36,58],"specifically":[37],"focus":[38],"on":[39,62],"requirements":[41],"conditions":[43],"Industrial":[46],"Internet":[47],"Things":[49],"(IIoT),":[50],"including":[51],"attribute":[52],"revocation":[53],"limited":[55],"computing":[56],"power.":[57],"evaluate":[59,94],"our":[60,76,95],"system":[61],"both":[63],"resource-constrained":[64],"devices":[65],"high-performance":[67],"cloud":[68],"instances.":[69],"Furthermore,":[70],"compare":[72],"overhead":[74],"implementation":[77,96],"classical":[79],"asymmetric":[80],"encryption":[81],"algorithms":[82],"like":[83],"RSA":[84],"ECC.":[86],"To":[87],"demonstrate":[88],"compatibility":[89],"existing":[91],"solutions,":[92],"in":[97,116,118],"Siemens":[99],"MindSphere":[100],"IIoT":[101],"operating":[102],"Our":[104],"results":[105],"show":[106],"that":[107],"decryption":[111],"can":[112],"indeed":[113],"be":[114],"used":[115],"practice":[117],"high-security":[119],"environments,":[120],"such":[121],"as":[122],"IIoT.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
