{"id":"https://openalex.org/W1972821615","doi":"https://doi.org/10.1109/infcomw.2014.6849262","title":"A lightweight access control mechanism for mobile cloud computing","display_name":"A lightweight access control mechanism for mobile cloud computing","publication_year":2014,"publication_date":"2014-04-01","ids":{"openalex":"https://openalex.org/W1972821615","doi":"https://doi.org/10.1109/infcomw.2014.6849262","mag":"1972821615"},"language":"en","primary_location":{"id":"doi:10.1109/infcomw.2014.6849262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2014.6849262","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032274547","display_name":"Xuanxia Yao","orcid":"https://orcid.org/0000-0002-1901-8388"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuanxia Yao","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China","[School of Computer & Communication Engineering University of Science and Technology Beijing, Beijing, China]"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China","institution_ids":["https://openalex.org/I92403157"]},{"raw_affiliation_string":"[School of Computer & Communication Engineering University of Science and Technology Beijing, Beijing, China]","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081098250","display_name":"Xiaoguang Han","orcid":"https://orcid.org/0000-0003-0810-259X"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoguang Han","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China","[School of Computer & Communication Engineering University of Science and Technology Beijing, Beijing, China]"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China","institution_ids":["https://openalex.org/I92403157"]},{"raw_affiliation_string":"[School of Computer & Communication Engineering University of Science and Technology Beijing, Beijing, China]","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","Department of Computer and Information Science, Temple University, Philadelphia PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]},{"raw_affiliation_string":"Department of Computer and Information Science, Temple University, Philadelphia PA, USA","institution_ids":["https://openalex.org/I84392919"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032274547"],"corresponding_institution_ids":["https://openalex.org/I92403157"],"apc_list":null,"apc_paid":null,"fwci":4.9081,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.95105931,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"6805","issue":null,"first_page":"380","last_page":"385"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8280516266822815},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6580347418785095},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.642287015914917},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6014726161956787},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5972902178764343},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.553516149520874},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5034443736076355},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.49931764602661133},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.41769635677337646},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4058695137500763},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.2966447174549103},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23411428928375244},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1615014672279358}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8280516266822815},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6580347418785095},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.642287015914917},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6014726161956787},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5972902178764343},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.553516149520874},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5034443736076355},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.49931764602661133},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.41769635677337646},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4058695137500763},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.2966447174549103},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23411428928375244},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1615014672279358}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infcomw.2014.6849262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2014.6849262","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1522101599","https://openalex.org/W1545347659","https://openalex.org/W1842316007","https://openalex.org/W2022351540","https://openalex.org/W2108072891","https://openalex.org/W2116626915","https://openalex.org/W2117616411","https://openalex.org/W2126293855","https://openalex.org/W2138001464","https://openalex.org/W6632616642"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W3161937915","https://openalex.org/W4386262237","https://openalex.org/W2030246973","https://openalex.org/W2896149133"],"abstract_inverted_index":{"In":[0,67,77],"order":[1],"to":[2,33,47,61],"meet":[3],"the":[4,35,48,63,102,116,133],"security":[5],"requirement,":[6],"most":[7],"data":[8,25],"are":[9],"stored":[10],"in":[11,27],"cloud":[12,45,90],"as":[13],"cipher-texts.":[14],"Hence,":[15],"a":[16,82,128],"cipher-text":[17,84,126],"based":[18,94],"access":[19,64,74,85,123],"control":[20,65,75,86,124],"mechanism":[21,87,117],"is":[22,32,40,93],"needed":[23],"for":[24,43,88,109],"sharing":[26],"cloud.":[28],"A":[29],"popular":[30],"solution":[31],"use":[34],"attribute-based":[36,69,134],"encryption.":[37],"However,":[38],"it":[39,59],"not":[41],"suitable":[42],"mobile":[44,89],"due":[46],"heavy":[49],"computation":[50],"overhead":[51],"caused":[52],"by":[53],"bilinear":[54],"pairing,":[55],"which":[56,92],"also":[57],"makes":[58],"difficult":[60],"change":[62],"policy.":[66],"addition,":[68],"encryption":[70,135],"can't":[71],"achieve":[72,119],"fine-grained":[73,122],"yet.":[76],"this":[78],"paper,":[79],"we":[80],"present":[81],"lightweight":[83],"computing,":[91],"on":[95,125],"authorization":[96],"certificates":[97],"and":[98,121],"secret":[99],"sharing.":[100],"Only":[101],"certificate":[103],"owner":[104],"can":[105,118],"reconstruct":[106],"decryption":[107],"keys":[108],"his/her":[110],"files.":[111],"Our":[112],"analyses":[113],"show":[114],"that":[115],"efficient":[120],"at":[127],"much":[129],"lower":[130],"cost":[131],"than":[132],"solution.":[136]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
