{"id":"https://openalex.org/W4214482175","doi":"https://doi.org/10.1007/978-981-19-0468-4_3","title":"A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes","display_name":"A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4214482175","doi":"https://doi.org/10.1007/978-981-19-0468-4_3"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-19-0468-4_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-19-0468-4_3","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100657575","display_name":"Shaobo Zhang","orcid":"https://orcid.org/0000-0001-7980-9651"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shaobo Zhang","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, 410073, China","Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019818377","display_name":"Shuo Yang","orcid":"https://orcid.org/0000-0002-0176-8383"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Yang","raw_affiliation_strings":["Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China"],"affiliations":[{"raw_affiliation_string":"Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113657517","display_name":"Gengming Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gengming Zhu","raw_affiliation_strings":["Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China"],"affiliations":[{"raw_affiliation_string":"Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101491585","display_name":"Entao Luo","orcid":"https://orcid.org/0000-0002-7147-5893"},"institutions":[{"id":"https://openalex.org/I24407930","display_name":"Hunan University of Science and Engineering","ror":"https://ror.org/04ymz0q33","country_code":"CN","type":"education","lineage":["https://openalex.org/I24407930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Entao Luo","raw_affiliation_strings":["School of Information Engineering, Hunan University of Science and Engineering, Yongzhou, 425199, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Hunan University of Science and Engineering, Yongzhou, 425199, China","institution_ids":["https://openalex.org/I24407930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064810678","display_name":"Jiyong Zhang","orcid":"https://orcid.org/0000-0001-9600-8477"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiyong Zhang","raw_affiliation_strings":["Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China"],"affiliations":[{"raw_affiliation_string":"Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052692967","display_name":"Desheng Xiang","orcid":null},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Desheng Xiang","raw_affiliation_strings":["Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China"],"affiliations":[{"raw_affiliation_string":"Hunan Key Laboratory of Service Computing and New Software Service Technology, Xiangtan, 411201, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China","institution_ids":["https://openalex.org/I121296143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100657575"],"corresponding_institution_ids":["https://openalex.org/I121296143","https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":2.743,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91664252,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.867138147354126},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.8418736457824707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7865599393844604},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6615326404571533},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6595109701156616},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6405796408653259},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5348405241966248},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.5166888236999512},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4825133979320526},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46079450845718384},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.4533308744430542},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4197443723678589},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.32302045822143555},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.22243115305900574},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.14852017164230347},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07663875818252563}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.867138147354126},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.8418736457824707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7865599393844604},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6615326404571533},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6595109701156616},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6405796408653259},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5348405241966248},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.5166888236999512},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4825133979320526},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46079450845718384},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.4533308744430542},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4197443723678589},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32302045822143555},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.22243115305900574},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.14852017164230347},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07663875818252563},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-19-0468-4_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-19-0468-4_3","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2086477792","https://openalex.org/W2100095839","https://openalex.org/W2107084504","https://openalex.org/W2529984679","https://openalex.org/W2591696897","https://openalex.org/W2783032667","https://openalex.org/W2851308068","https://openalex.org/W2900467432","https://openalex.org/W2910358275","https://openalex.org/W2946153995","https://openalex.org/W2998416486","https://openalex.org/W3020527512","https://openalex.org/W3047027698","https://openalex.org/W3096223887","https://openalex.org/W3118925795","https://openalex.org/W3129268705","https://openalex.org/W3132102963","https://openalex.org/W3146591213","https://openalex.org/W3157410151","https://openalex.org/W3170101058","https://openalex.org/W3177280216","https://openalex.org/W3181032777","https://openalex.org/W3182732262","https://openalex.org/W3183858692"],"related_works":["https://openalex.org/W2094052616","https://openalex.org/W1596015467","https://openalex.org/W2788225348","https://openalex.org/W2102147828","https://openalex.org/W2553096087","https://openalex.org/W2530459946","https://openalex.org/W2296217683","https://openalex.org/W2148952798","https://openalex.org/W3158270748","https://openalex.org/W2015185390"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
