{"id":"https://openalex.org/W4318624531","doi":"https://doi.org/10.1109/tdsc.2023.3240820","title":"FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing","display_name":"FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing","publication_year":2023,"publication_date":"2023-01-31","ids":{"openalex":"https://openalex.org/W4318624531","doi":"https://doi.org/10.1109/tdsc.2023.3240820"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3240820","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3240820","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://repository.tudelft.nl/file/File_a8171db1-31fa-41fa-bd8f-04692712e0df","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100356430","display_name":"Lili Wang","orcid":"https://orcid.org/0000-0003-3228-4290"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lili Wang","raw_affiliation_strings":["School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391268","display_name":"Lin Ye","orcid":"https://orcid.org/0000-0002-9647-0271"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Lin","raw_affiliation_strings":["School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075347469","display_name":"Ting Yao","orcid":"https://orcid.org/0000-0001-9011-6864"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Yao","raw_affiliation_strings":["School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100643589","display_name":"Hu Xiong","orcid":"https://orcid.org/0000-0001-6137-6667"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hu Xiong","raw_affiliation_strings":["School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001485404","display_name":"Kaitai Liang","orcid":"https://orcid.org/0000-0003-0262-7678"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Kaitai Liang","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, CD, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, CD, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100356430"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":6.8999,"has_fulltext":true,"cited_by_count":40,"citation_normalized_percentile":{"value":0.97581137,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"20","issue":"6","first_page":"5130","last_page":"5142"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9728999733924866,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8215322494506836},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7698627710342407},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.714660108089447},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6791819930076599},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6305354237556458},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5523300766944885},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45335450768470764},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.43245962262153625},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.4271582067012787},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.42655253410339355},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4252042770385742},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.42118698358535767},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3932484984397888},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37339216470718384},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3686525225639343},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2036069929599762},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09579572081565857},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09122541546821594}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8215322494506836},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7698627710342407},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.714660108089447},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6791819930076599},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6305354237556458},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5523300766944885},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45335450768470764},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.43245962262153625},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.4271582067012787},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.42655253410339355},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4252042770385742},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.42118698358535767},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3932484984397888},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37339216470718384},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3686525225639343},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2036069929599762},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09579572081565857},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09122541546821594},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2023.3240820","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3240820","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:tudelft.nl:uuid:bc960f8a-41df-4f27-a4f1-7c9b9d601ee5","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:bc960f8a-41df-4f27-a4f1-7c9b9d601ee5","pdf_url":"https://repository.tudelft.nl/file/File_a8171db1-31fa-41fa-bd8f-04692712e0df","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"}],"best_oa_location":{"id":"pmh:oai:tudelft.nl:uuid:bc960f8a-41df-4f27-a4f1-7c9b9d601ee5","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:bc960f8a-41df-4f27-a4f1-7c9b9d601ee5","pdf_url":"https://repository.tudelft.nl/file/File_a8171db1-31fa-41fa-bd8f-04692712e0df","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5600000023841858,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1555812177","display_name":null,"funder_award_id":"U1936101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1758561082","display_name":"Future Proofing of ICT Trust Chains: Sustainable Operational Assurance and Verification Remote Guards for Systems-of-Systems Security and Privacy","funder_award_id":"952697","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3011155338","display_name":null,"funder_award_id":"202102","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3261283721","display_name":null,"funder_award_id":"101070052","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8037692817","display_name":"artificial Intelligence threat Reporting and Incident response System","funder_award_id":"101021727","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4318624531.pdf","grobid_xml":"https://content.openalex.org/works/W4318624531.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W39353691","https://openalex.org/W177444027","https://openalex.org/W1498316612","https://openalex.org/W1500253167","https://openalex.org/W1517738348","https://openalex.org/W1537844681","https://openalex.org/W1546886278","https://openalex.org/W1574326402","https://openalex.org/W1590823599","https://openalex.org/W1738472778","https://openalex.org/W1890078278","https://openalex.org/W1896261913","https://openalex.org/W1963941691","https://openalex.org/W1993032872","https://openalex.org/W2014143000","https://openalex.org/W2042220809","https://openalex.org/W2048489822","https://openalex.org/W2048672245","https://openalex.org/W2067095453","https://openalex.org/W2076041645","https://openalex.org/W2098105074","https://openalex.org/W2104348420","https://openalex.org/W2114296561","https://openalex.org/W2114428623","https://openalex.org/W2122589245","https://openalex.org/W2133141035","https://openalex.org/W2138001464","https://openalex.org/W2211075457","https://openalex.org/W2316967260","https://openalex.org/W2325737963","https://openalex.org/W2405356014","https://openalex.org/W2505122866","https://openalex.org/W2552743177","https://openalex.org/W2596298465","https://openalex.org/W2765635759","https://openalex.org/W2789097676","https://openalex.org/W2790515622","https://openalex.org/W2793241364","https://openalex.org/W2795178971","https://openalex.org/W2806531551","https://openalex.org/W2897052156","https://openalex.org/W2945857063","https://openalex.org/W2976706823","https://openalex.org/W3014625547","https://openalex.org/W3016761910","https://openalex.org/W3094474718"],"related_works":["https://openalex.org/W2094124631","https://openalex.org/W4386413025","https://openalex.org/W2735268417","https://openalex.org/W2549192755","https://openalex.org/W2328593319","https://openalex.org/W2289583906","https://openalex.org/W2558893138","https://openalex.org/W2950035790","https://openalex.org/W2791169991","https://openalex.org/W2887109888"],"abstract_inverted_index":{"Existing":[0],"proxy":[1,36],"re-encryption":[2,37,92],"(PRE)":[3],"schemes":[4],"to":[5,45,51,61,74],"secure":[6,33],"cloud":[7,49,147],"data":[8],"sharing":[9],"raise":[10],"challenges":[11],"such":[12,104],"as":[13],"supporting":[14],"the":[15,21,43,47,71,76,88,95,106,115,124,146],"heterogeneous":[16],"system":[17,116],"efficiently":[18],"and":[19,32,91,132,143],"achieving":[20],"unbounded":[22,34,103],"feature.":[23],"To":[24],"address":[25],"this":[26],"problem,":[27],"we":[28],"proposed":[29],"a":[30],"fast":[31],"cross-domain":[35],"scheme,":[38],"named":[39],"FABRIC,":[40],"which":[41],"enables":[42],"delegator":[44],"authorize":[46],"semi-trusted":[48],"server":[50],"convert":[52],"one":[53],"ciphertext":[54,63],"of":[55,64,97],"an":[56,65],"identity-based":[57],"encryption":[58,67],"(IBE)":[59],"scheme":[60,73],"another":[62],"attribute-based":[66],"(ABE)":[68],"scheme.":[69],"As":[70],"first":[72],"achieve":[75],"feature":[77],"mentioned":[78],"above,":[79],"FABRIC":[80,119,137],"not":[81],"only":[82],"enjoys":[83,138],"constant":[84],"computation":[85],"overhead":[86],"in":[87,141,145],"encryption,":[89],"decryption,":[90],"phases":[93],"when":[94],"quantity":[96],"attributes":[98,108],"increases,":[99],"but":[100],"is":[101],"also":[102],"that":[105,136],"new":[107],"or":[109],"roles":[110],"could":[111],"be":[112],"adopted":[113],"into":[114],"anytime.":[117],"Furthermore,":[118],"achieves":[120],"adaptive":[121],"security":[122],"under":[123],"decisional":[125],"linear":[126],"assumption":[127],"(DLIN).":[128],"Eventually,":[129],"detailed":[130],"theoretical":[131],"experimental":[133],"analysis":[134],"proved":[135],"excellent":[139],"performance":[140],"efficiency":[142],"practicality":[144],"computing":[148],"scenario.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":6}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
