{"id":"https://openalex.org/W4409474274","doi":"https://doi.org/10.1109/jsac.2025.3560036","title":"Dynamic Security Computing Framework With Zero Trust Based on Privacy Domain Prevention and Control Theory","display_name":"Dynamic Security Computing Framework With Zero Trust Based on Privacy Domain Prevention and Control Theory","publication_year":2025,"publication_date":"2025-04-15","ids":{"openalex":"https://openalex.org/W4409474274","doi":"https://doi.org/10.1109/jsac.2025.3560036"},"language":"en","primary_location":{"id":"doi:10.1109/jsac.2025.3560036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2025.3560036","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091170889","display_name":"Xiang Wu","orcid":"https://orcid.org/0000-0001-5190-9781"},"institutions":[{"id":"https://openalex.org/I177388780","display_name":"Xuzhou Medical College","ror":"https://ror.org/04fe7hy80","country_code":"CN","type":"education","lineage":["https://openalex.org/I177388780"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiang Wu","raw_affiliation_strings":["Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China","institution_ids":["https://openalex.org/I177388780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023580597","display_name":"Baowen Zou","orcid":"https://orcid.org/0000-0003-1998-4866"},"institutions":[{"id":"https://openalex.org/I177388780","display_name":"Xuzhou Medical College","ror":"https://ror.org/04fe7hy80","country_code":"CN","type":"education","lineage":["https://openalex.org/I177388780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baowen Zou","raw_affiliation_strings":["Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China","institution_ids":["https://openalex.org/I177388780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046637672","display_name":"Chengpeng Lu","orcid":"https://orcid.org/0000-0002-2035-2295"},"institutions":[{"id":"https://openalex.org/I177388780","display_name":"Xuzhou Medical College","ror":"https://ror.org/04fe7hy80","country_code":"CN","type":"education","lineage":["https://openalex.org/I177388780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuanchuan Lu","raw_affiliation_strings":["Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China","institution_ids":["https://openalex.org/I177388780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101518921","display_name":"Lili Wang","orcid":"https://orcid.org/0000-0002-7950-5401"},"institutions":[{"id":"https://openalex.org/I177388780","display_name":"Xuzhou Medical College","ror":"https://ror.org/04fe7hy80","country_code":"CN","type":"education","lineage":["https://openalex.org/I177388780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lili Wang","raw_affiliation_strings":["Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China","institution_ids":["https://openalex.org/I177388780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044503411","display_name":"Yongting Zhang","orcid":"https://orcid.org/0000-0002-8202-6612"},"institutions":[{"id":"https://openalex.org/I177388780","display_name":"Xuzhou Medical College","ror":"https://ror.org/04fe7hy80","country_code":"CN","type":"education","lineage":["https://openalex.org/I177388780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongting Zhang","raw_affiliation_strings":["Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China","institution_ids":["https://openalex.org/I177388780"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100379136","display_name":"Huanhuan Wang","orcid":"https://orcid.org/0000-0003-4689-5578"},"institutions":[{"id":"https://openalex.org/I177388780","display_name":"Xuzhou Medical College","ror":"https://ror.org/04fe7hy80","country_code":"CN","type":"education","lineage":["https://openalex.org/I177388780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huanhuan Wang","raw_affiliation_strings":["Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Medical Information Security, Xuzhou Medical University, Xuzhou, China","institution_ids":["https://openalex.org/I177388780"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5091170889"],"corresponding_institution_ids":["https://openalex.org/I177388780"],"apc_list":null,"apc_paid":null,"fwci":135.8467,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.99986556,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"43","issue":"6","first_page":"2266","last_page":"2278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9125999808311462,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9125999808311462,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9107999801635742,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8277324438095093},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5573717355728149},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.485520601272583},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.4694767892360687},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4607890546321869},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.43540796637535095},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.4193163216114044},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3313075602054596},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29886531829833984}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8277324438095093},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5573717355728149},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.485520601272583},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.4694767892360687},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4607890546321869},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.43540796637535095},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.4193163216114044},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3313075602054596},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29886531829833984},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsac.2025.3560036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2025.3560036","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5282279404","display_name":null,"funder_award_id":"KC22298","funder_id":"https://openalex.org/F4320336657","funder_display_name":"Xuzhou Science and Technology Program"},{"id":"https://openalex.org/G8468918360","display_name":null,"funder_award_id":"2020YFC2006600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320336657","display_name":"Xuzhou Science and Technology Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W2034960640","https://openalex.org/W2151040995","https://openalex.org/W2153635508","https://openalex.org/W2296350496","https://openalex.org/W2304776229","https://openalex.org/W2907477193","https://openalex.org/W2964346351","https://openalex.org/W3045998670","https://openalex.org/W3088631669","https://openalex.org/W3131713529","https://openalex.org/W3153142183","https://openalex.org/W3180789318","https://openalex.org/W3190748510","https://openalex.org/W3200400919","https://openalex.org/W3202927949","https://openalex.org/W4205270472","https://openalex.org/W4205549871","https://openalex.org/W4205995660","https://openalex.org/W4224246411","https://openalex.org/W4226486427","https://openalex.org/W4285176735","https://openalex.org/W4285205927","https://openalex.org/W4285274066","https://openalex.org/W4288804239","https://openalex.org/W4290715531","https://openalex.org/W4293199609","https://openalex.org/W4294982825","https://openalex.org/W4300862703","https://openalex.org/W4312627840","https://openalex.org/W4319297893","https://openalex.org/W4319335560","https://openalex.org/W4319871790","https://openalex.org/W4360995406","https://openalex.org/W4362665947","https://openalex.org/W4366277429","https://openalex.org/W4381713937","https://openalex.org/W4384916292","https://openalex.org/W4385366999","https://openalex.org/W4386813249","https://openalex.org/W4387757647","https://openalex.org/W4388570797","https://openalex.org/W4394674799","https://openalex.org/W4394693490","https://openalex.org/W6640362995"],"related_works":["https://openalex.org/W4406460655","https://openalex.org/W2952570804","https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331"],"abstract_inverted_index":{"With":[0],"a":[1,9,17,33,46,69,88],"growing":[2],"security":[3],"threat":[4],"in":[5,30,137],"wireless":[6,143],"communication":[7],"networks,":[8],"promising":[10],"method":[11,92,116],"for":[12,127],"secure":[13],"next-generation":[14],"networks":[15,146],"is":[16,32,80,93,117],"zero-trust":[18,42],"framework":[19,43],"focusing":[20],"on":[21,76],"authentication":[22,31,38],"schemes.":[23,67],"How":[24],"to":[25,82,95,119],"analyze":[26],"the":[27,41,100,121,131,135,155,160],"risks":[28,39],"involved":[29],"challenge.":[34],"This":[35],"study":[36],"quantifies":[37],"within":[40],"and":[44,61,157],"introduces":[45],"privacy":[47,55,65,71,85,97],"domain":[48],"prevention-control":[49,103,125],"theory.":[50],"The":[51,150],"theory":[52,136],"encompasses":[53],"dynamic":[54,70],"risk":[56,59,72,90],"assessment,":[57],"intelligent":[58],"classification,":[60],"automated":[62],"selection":[63,101,123],"of":[64,102,124,134,142,159],"protection":[66],"First,":[68],"assessment":[73],"method,":[74],"based":[75],"physical":[77],"entity":[78],"relationships,":[79],"proposed":[81,161],"evaluate":[83],"all":[84],"risks.":[86],"Second,":[87],"five-category":[89],"classification":[91],"designed":[94],"categorize":[96],"risks,":[98],"facilitating":[99],"schemes,":[104],"with":[105],"its":[106,148],"rationality":[107],"mathematically":[108],"validated.":[109],"Additionally,":[110],"an":[111],"Analytical":[112],"Hierarchy":[113],"Process":[114],"(AHP)-based":[115],"introduced":[118],"guide":[120],"optimal":[122],"schemes":[126],"various":[128],"scenarios.":[129],"Finally,":[130],"practical":[132],"application":[133],"medicine":[138],"multi-modal":[139],"computing":[140],"scene":[141],"body":[144],"area":[145],"demonstrates":[147],"effectiveness.":[149],"experimental":[151],"results":[152],"also":[153],"show":[154],"superiority":[156],"feasibility":[158],"methods.":[162]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":25}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
