{"id":"https://openalex.org/W4396594881","doi":"https://doi.org/10.1109/tmc.2024.3395388","title":"Enabling Efficient and Distributed Access Control for Pervasive Edge Computing Services","display_name":"Enabling Efficient and Distributed Access Control for Pervasive Edge Computing Services","publication_year":2024,"publication_date":"2024-05-02","ids":{"openalex":"https://openalex.org/W4396594881","doi":"https://doi.org/10.1109/tmc.2024.3395388"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2024.3395388","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3395388","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102920646","display_name":"Lingshuang Liu","orcid":"https://orcid.org/0009-0002-9239-6753"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Lingshuang Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038498019","display_name":"Cheng Huang","orcid":"https://orcid.org/0000-0003-3769-7211"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Huang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101978791","display_name":"Dan Zhu","orcid":"https://orcid.org/0000-0002-3365-6757"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Zhu","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017433297","display_name":"Dongxiao Liu","orcid":"https://orcid.org/0000-0003-2595-6757"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongxiao Liu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033931001","display_name":"Jianbing Ni","orcid":"https://orcid.org/0000-0002-5639-0883"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jianbing Ni","raw_affiliation_strings":["Department of Electrical and Computer Engineering and Ingenuity Labs Research Institute, Queen&#x0027;s University, Kingston, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering and Ingenuity Labs Research Institute, Queen&#x0027;s University, Kingston, Ontario, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102920646"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":11.3257,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.98199344,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"23","issue":"12","first_page":"11342","last_page":"11356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8359251022338867},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.6322158575057983},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5657141804695129},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5592397451400757},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5449627041816711},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5248839259147644},{"id":"https://openalex.org/keywords/context-aware-pervasive-systems","display_name":"Context-aware pervasive systems","score":0.5131062269210815},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.43593132495880127},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.407515287399292},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32946085929870605},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22872686386108398},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15281423926353455}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8359251022338867},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.6322158575057983},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5657141804695129},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5592397451400757},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5449627041816711},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5248839259147644},{"id":"https://openalex.org/C48052980","wikidata":"https://www.wikidata.org/wiki/Q4231629","display_name":"Context-aware pervasive systems","level":3,"score":0.5131062269210815},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.43593132495880127},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.407515287399292},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32946085929870605},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22872686386108398},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15281423926353455}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2024.3395388","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3395388","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1496346989","https://openalex.org/W1574149717","https://openalex.org/W2092335398","https://openalex.org/W2316482457","https://openalex.org/W2555595399","https://openalex.org/W2590898937","https://openalex.org/W2620085947","https://openalex.org/W2763925543","https://openalex.org/W2912978522","https://openalex.org/W2944812228","https://openalex.org/W2946807166","https://openalex.org/W2950865323","https://openalex.org/W2963373072","https://openalex.org/W2975188135","https://openalex.org/W2983694339","https://openalex.org/W2998416486","https://openalex.org/W3002779531","https://openalex.org/W3005206852","https://openalex.org/W3033209635","https://openalex.org/W3040688899","https://openalex.org/W3044672221","https://openalex.org/W3091074232","https://openalex.org/W3092245649","https://openalex.org/W3096081135","https://openalex.org/W3124433578","https://openalex.org/W3131893502","https://openalex.org/W3135497297","https://openalex.org/W3162965137","https://openalex.org/W3174468309","https://openalex.org/W3198147790","https://openalex.org/W3199684414","https://openalex.org/W3213317411","https://openalex.org/W4214564192","https://openalex.org/W4225775401","https://openalex.org/W4311080956","https://openalex.org/W4315630225","https://openalex.org/W4317727957","https://openalex.org/W4375798301","https://openalex.org/W6699342439","https://openalex.org/W6780553248"],"related_works":["https://openalex.org/W2543142712","https://openalex.org/W2739586290","https://openalex.org/W2090498639","https://openalex.org/W2915650030","https://openalex.org/W2094192006","https://openalex.org/W2123086119","https://openalex.org/W2557071829","https://openalex.org/W2139852043","https://openalex.org/W2114035912","https://openalex.org/W1493658939"],"abstract_inverted_index":{"In":[0,74,169],"this":[1],"paper,":[2],"we":[3,200],"propose":[4],"an":[5,108],"efficient":[6,52,130],"and":[7,53,65,71,136,162,215,220,224,233,239],"distributed":[8,54],"service":[9,55,60,62,86,91,120,123,158,172,205,213,218,236],"access":[10,56,63,124,206],"control":[11,207],"framework":[12],"(E-DAC)":[13],"in":[14,88,190,208],"the":[15,22,28,39,49,95,119,157,163,171,179,182,193,196,202],"pervasive":[16],"edge":[17,30,45,59,69,72,109,126,134,186],"computing":[18,36],"(PEC)":[19],"environment,":[20],"where":[21],"resources":[23],"of":[24,44,51,98,176,181,195,204,212,217],"peer":[25],"devices":[26,41],"at":[27],"network":[29],"are":[31],"integrated":[32],"to":[33,38,83,101,115,192,226],"provide":[34],"latencysensitive":[35],"services":[37,100],"nearby":[40],"on":[42,125,235],"behalf":[43],"servers.":[46],"E-DAC":[47,77,112,229],"addresses":[48],"challenge":[50],"control,":[57],"comprising":[58],"authorization,":[61,64,87,237],"mutual":[66],"authentication":[67],"between":[68],"servers":[70,127,135,187],"devices.":[73],"dong":[75],"so,":[76],"first":[78],"extends":[79],"a":[80,90,103,146],"key-aggregate":[81],"cryptosystem":[82],"enable":[84],"batch":[85],"which":[89],"provider":[92,121,173],"can":[93,138],"aggregate":[94,105],"authorization":[96,117,180,214],"keys":[97],"different":[99],"produce":[102],"constant-size":[104],"key":[106],"for":[107,122],"server.":[110],"Second,":[111],"enables":[113],"users":[114,137,189],"acquire":[116],"from":[118],"by":[128],"using":[129],"secret":[131],"sharing.":[132],"Third,":[133],"authenticate":[139],"with":[140,145],"each":[141],"other":[142],"without":[143],"interacting":[144],"centralized":[147],"server,":[148],"while":[149],"enabling":[150],"secure":[151],"zero-round":[152],"trip":[153],"communication,":[154],"so":[155],"that":[156,228],"data":[159],"is":[160,167,174,230],"protected":[161],"communication":[164],"bandwidth":[165],"cost":[166],"low.":[168],"addition,":[170],"capable":[175],"efficiently":[177],"revoking":[178],"dropout":[183],"or":[184,188],"compromised":[185],"response":[191],"dynamics":[194],"PEC":[197],"environment.":[198],"Finally,":[199],"prove":[201],"security":[203],"E-DAC,":[209],"including":[210],"unforgeability":[211],"confidentiality":[216],"data,":[219],"conduct":[221],"extensive":[222],"analysis":[223],"experiments":[225],"demonstrate":[227],"highly":[231],"computational":[232],"communication-efficient":[234],"authentication,":[238],"revocation.":[240]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
