{"id":"https://openalex.org/W4386474173","doi":"https://doi.org/10.1109/lcn58197.2023.10223319","title":"Trusted Sharing of Data Under Cloud-Edge-End Collaboration and Its Formal Verification","display_name":"Trusted Sharing of Data Under Cloud-Edge-End Collaboration and Its Formal Verification","publication_year":2023,"publication_date":"2023-09-06","ids":{"openalex":"https://openalex.org/W4386474173","doi":"https://doi.org/10.1109/lcn58197.2023.10223319"},"language":"en","primary_location":{"id":"doi:10.1109/lcn58197.2023.10223319","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/lcn58197.2023.10223319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006959370","display_name":"Xuejian Li","orcid":"https://orcid.org/0000-0001-9284-7433"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuejian Li","raw_affiliation_strings":["Anhui University,School of Computer Science and Technology,Hefei Anhui,China","School of Computer Science and Technology, Anhui University, Hefei Anhui, China"],"affiliations":[{"raw_affiliation_string":"Anhui University,School of Computer Science and Technology,Hefei Anhui,China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei Anhui, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087681222","display_name":"Mingguang Wang","orcid":"https://orcid.org/0009-0005-0715-9529"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingguang Wang","raw_affiliation_strings":["Anhui University,School of Computer Science and Technology,Hefei Anhui,China","School of Computer Science and Technology, Anhui University, Hefei Anhui, China"],"affiliations":[{"raw_affiliation_string":"Anhui University,School of Computer Science and Technology,Hefei Anhui,China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei Anhui, China","institution_ids":["https://openalex.org/I143868143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5006959370"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":0.3491,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65359368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"32","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8514773845672607},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.78025221824646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6340763568878174},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6309707760810852},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5603632926940918},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5423174500465393},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5085057020187378},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.48764148354530334},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4829363226890564},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.46007898449897766},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4446841776371002},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4417104125022888},{"id":"https://openalex.org/keywords/end-user","display_name":"End user","score":0.4402962923049927},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39360058307647705},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19649747014045715},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18872517347335815},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10251867771148682}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8514773845672607},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78025221824646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6340763568878174},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6309707760810852},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5603632926940918},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5423174500465393},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5085057020187378},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.48764148354530334},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4829363226890564},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.46007898449897766},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4446841776371002},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4417104125022888},{"id":"https://openalex.org/C91262260","wikidata":"https://www.wikidata.org/wiki/Q528074","display_name":"End user","level":2,"score":0.4402962923049927},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39360058307647705},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19649747014045715},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18872517347335815},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10251867771148682},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn58197.2023.10223319","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/lcn58197.2023.10223319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W2118329289","https://openalex.org/W2753157565","https://openalex.org/W3101067455","https://openalex.org/W3209666794","https://openalex.org/W4307864888","https://openalex.org/W6846509487"],"related_works":["https://openalex.org/W2372678089","https://openalex.org/W2695299078","https://openalex.org/W2355956995","https://openalex.org/W2390768934","https://openalex.org/W2350048275","https://openalex.org/W2086874776","https://openalex.org/W2168345601","https://openalex.org/W2028268185","https://openalex.org/W2377235694","https://openalex.org/W2001281341"],"abstract_inverted_index":{"With":[0],"the":[1,22,31,35,65,71,84,88,91,115,118,125,145],"development":[2],"of":[3,24,64,90,105,117,127,148],"cloud":[4,17,36],"computing":[5],"and":[6,11,19,57,143],"edge":[7,18,25],"computing,":[8],"data":[9,32,38,47,58,67,106,119],"sharing":[10,48,68,104],"collaboration":[12,109],"have":[13],"become":[14],"increasing":[15],"between":[16],"end.":[20],"Under":[21],"assistance":[23],"cloud,":[26],"end":[27,81,92],"users":[28],"can":[29],"access":[30],"stored":[33],"in":[34,41,111],"by":[37,79],"owners.":[39],"However,":[40],"an":[42,100],"unprotected":[43],"cloud-edge-end":[44,108],"network":[45,94,121],"environment,":[46],"is":[49],"vulnerable":[50],"to":[51,75,139],"security":[52,146],"threats":[53],"from":[54],"malicious":[55],"users,":[56,82],"confidentiality":[59],"cannot":[60,86],"be":[61],"guaranteed.":[62],"Most":[63],"existing":[66],"approaches":[69],"use":[70],"identity":[72],"authentication":[73],"mechanism":[74,85,126],"resist":[76],"unauthorized":[77],"accessed":[78],"illegal":[80],"but":[83],"guarantee":[87],"credibility":[89],"user\u2019s":[93],"environment.":[95],"Therefore,":[96],"this":[97,132],"article":[98,133],"proposes":[99],"approach":[101],"for":[102],"trusted":[103],"under":[107],"(TSDCEE),":[110],"which":[112],"we":[113],"verify":[114],"trustworthiness":[116],"requester\u2019s":[120],"environment":[122],"based":[123],"on":[124],"attribute":[128],"remote":[129],"attestation.":[130],"Finally,":[131],"uses":[134],"model":[135],"checking":[136],"Spin":[137],"method":[138],"formally":[140],"analyze":[141],"TSDCEE,":[142],"verifies":[144],"properties":[147],"TSDCEE.":[149]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
