{"id":"https://openalex.org/W2755970104","doi":"https://doi.org/10.1007/978-981-10-6385-5_19","title":"Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption","display_name":"Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2755970104","doi":"https://doi.org/10.1007/978-981-10-6385-5_19","mag":"2755970104"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-10-6385-5_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-10-6385-5_19","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042795141","display_name":"Xi Lin","orcid":"https://orcid.org/0000-0002-6929-8429"},"institutions":[{"id":"https://openalex.org/I4210115513","display_name":"Xi\u2019an University","ror":"https://ror.org/01zzmf129","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210115513"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xi Lin","raw_affiliation_strings":["Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, 710086, China","Department of Electronic Technology, Engineering University of PAP, Xi'an, 710086, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, 710086, China","institution_ids":["https://openalex.org/I4210115513"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of PAP, Xi'an, 710086, China","institution_ids":["https://openalex.org/I4210115513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066586188","display_name":"Yiliang Han","orcid":"https://orcid.org/0000-0002-2116-5408"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]},{"id":"https://openalex.org/I4210115513","display_name":"Xi\u2019an University","ror":"https://ror.org/01zzmf129","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210115513"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiliang Han","raw_affiliation_strings":["College of Information Science and Technology, Northwest University, Xi\u2019an, 710127, China","Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, 710086, China","Department of Electronic Technology, Engineering University of PAP, Xi'an, 710086, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Northwest University, Xi\u2019an, 710127, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, 710086, China","institution_ids":["https://openalex.org/I4210115513"]},{"raw_affiliation_string":"Department of Electronic Technology, Engineering University of PAP, Xi'an, 710086, China","institution_ids":["https://openalex.org/I4210115513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042795141"],"corresponding_institution_ids":["https://openalex.org/I4210115513"],"apc_list":null,"apc_paid":null,"fwci":0.2826,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58562681,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"220","last_page":"230"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8728351593017578},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7556595802307129},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5481850504875183},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.543028712272644},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.540303111076355},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5386227369308472},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5333587527275085},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5172591805458069},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5020451545715332},{"id":"https://openalex.org/keywords/premise","display_name":"Premise","score":0.49144041538238525},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.45388680696487427},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4450746774673462},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35273879766464233},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3346584439277649},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0887397825717926},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0866701602935791}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8728351593017578},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7556595802307129},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5481850504875183},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.543028712272644},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.540303111076355},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5386227369308472},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5333587527275085},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5172591805458069},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5020451545715332},{"id":"https://openalex.org/C2778023277","wikidata":"https://www.wikidata.org/wiki/Q321703","display_name":"Premise","level":2,"score":0.49144041538238525},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.45388680696487427},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4450746774673462},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35273879766464233},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3346584439277649},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0887397825717926},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0866701602935791},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-10-6385-5_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-10-6385-5_19","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W1510795740","https://openalex.org/W2108072891","https://openalex.org/W2152924492","https://openalex.org/W2349206783","https://openalex.org/W2356495338","https://openalex.org/W2357024068","https://openalex.org/W2380044074","https://openalex.org/W2380105316","https://openalex.org/W3128663643","https://openalex.org/W3212783986"],"related_works":["https://openalex.org/W2756423716","https://openalex.org/W4387191618","https://openalex.org/W1993945719","https://openalex.org/W4387429380","https://openalex.org/W4230431223","https://openalex.org/W2168926258","https://openalex.org/W3149394126","https://openalex.org/W1976536045","https://openalex.org/W2174604763","https://openalex.org/W4246652009"],"abstract_inverted_index":null,"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
