{"id":"https://openalex.org/W4312250418","doi":"https://doi.org/10.1007/978-3-031-18067-5_4","title":"A Collaborative Access Control Scheme Based on\u00a0Incentive Mechanisms","display_name":"A Collaborative Access Control Scheme Based on\u00a0Incentive Mechanisms","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312250418","doi":"https://doi.org/10.1007/978-3-031-18067-5_4"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-18067-5_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-18067-5_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100355214","display_name":"Yifei Li","orcid":"https://orcid.org/0000-0001-6507-7189"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yifei Li","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, 710121, China","School of Cyberspace Security, Xian University of Posts and Telecommunications, Xian, 710121, China","National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-6507-7189","affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"School of Cyberspace Security, Xian University of Posts and Telecommunications, Xian, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100629240","display_name":"Yinghui Zhang","orcid":"https://orcid.org/0000-0002-5764-3272"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinghui Zhang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, 710121, China","School of Cyberspace Security, Xian University of Posts and Telecommunications, Xian, 710121, China","Westone Cryptologic Research Center, Beijing, 100070, China","Westone Cryptologic Research Center, Beijing, China","National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-5764-3272","affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"School of Cyberspace Security, Xian University of Posts and Telecommunications, Xian, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, 100070, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007195863","display_name":"Wei Liu","orcid":"https://orcid.org/0000-0002-1679-6862"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Liu","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, 710121, China","School of Cyberspace Security, Xian University of Posts and Telecommunications, Xian, 710121, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, China"],"raw_orcid":"https://orcid.org/0000-0002-1679-6862","affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"School of Cyberspace Security, Xian University of Posts and Telecommunications, Xian, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-7165-398X","affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101955694","display_name":"Dong Zheng","orcid":"https://orcid.org/0000-0002-3860-2037"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zheng","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, 710121, China","School of Cyberspace Security, Xian University of Posts and Telecommunications, Xian, 710121, China","Westone Cryptologic Research Center, Beijing, 100070, China","National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, China","Westone Cryptologic Research Center, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-3860-2037","affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"School of Cyberspace Security, Xian University of Posts and Telecommunications, Xian, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, 100070, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xian University of Posts and Telecommunications, Xian, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100355214"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210136859"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.6847,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73865882,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"48","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.811720609664917},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7775241136550903},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7418555617332458},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6952424645423889},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.6873029470443726},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.623798131942749},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5606504082679749},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5529058575630188},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5296682715415955},{"id":"https://openalex.org/keywords/enthusiasm","display_name":"Enthusiasm","score":0.520438015460968},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5057806968688965},{"id":"https://openalex.org/keywords/cloud-server","display_name":"Cloud server","score":0.412274569272995},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3515138626098633},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23531392216682434}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.811720609664917},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7775241136550903},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7418555617332458},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6952424645423889},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.6873029470443726},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.623798131942749},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5606504082679749},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5529058575630188},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5296682715415955},{"id":"https://openalex.org/C2781354396","wikidata":"https://www.wikidata.org/wiki/Q840407","display_name":"Enthusiasm","level":2,"score":0.520438015460968},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5057806968688965},{"id":"https://openalex.org/C2987335383","wikidata":"https://www.wikidata.org/wiki/Q878048","display_name":"Cloud server","level":3,"score":0.412274569272995},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3515138626098633},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23531392216682434},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-18067-5_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-18067-5_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W123899820","https://openalex.org/W175981956","https://openalex.org/W1997666951","https://openalex.org/W2090700544","https://openalex.org/W2108072891","https://openalex.org/W2559094099","https://openalex.org/W2602861692","https://openalex.org/W2783232377","https://openalex.org/W2886211034","https://openalex.org/W2889424716","https://openalex.org/W2910199432","https://openalex.org/W2945857063","https://openalex.org/W2960870100","https://openalex.org/W2977127134","https://openalex.org/W3194588796","https://openalex.org/W3198147790","https://openalex.org/W3199684414","https://openalex.org/W7017614602"],"related_works":["https://openalex.org/W3046088002","https://openalex.org/W2383950765","https://openalex.org/W3011934965","https://openalex.org/W2883724699","https://openalex.org/W2792501016","https://openalex.org/W2743003114","https://openalex.org/W4234681972","https://openalex.org/W2184706958","https://openalex.org/W2734114488","https://openalex.org/W4315881525"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
