{"id":"https://openalex.org/W4406890304","doi":"https://doi.org/10.1109/tmc.2025.3534861","title":"PAC-MC: An Efficient Password-Based Access Control Framework for Time Sequence Aware Media Cloud","display_name":"PAC-MC: An Efficient Password-Based Access Control Framework for Time Sequence Aware Media Cloud","publication_year":2025,"publication_date":"2025-01-28","ids":{"openalex":"https://openalex.org/W4406890304","doi":"https://doi.org/10.1109/tmc.2025.3534861"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3534861","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3534861","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102003407","display_name":"Haiyan Wang","orcid":"https://orcid.org/0000-0002-5702-9897"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiyan Wang","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101645401","display_name":"Penghui Liu","orcid":"https://orcid.org/0000-0002-3153-6487"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Penghui Liu","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100681423","display_name":"Xiaoxiong Zhong","orcid":"https://orcid.org/0000-0001-9307-6247"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoxiong Zhong","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000037502","display_name":"Fucai Luo","orcid":"https://orcid.org/0000-0001-7961-5750"},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fucai Luo","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365935","display_name":"Bin Xiao","orcid":"https://orcid.org/0000-0003-4223-8220"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Bin Xiao","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100638446","display_name":"Yuanyuan Yang","orcid":"https://orcid.org/0000-0001-7296-9222"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuanyuan Yang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102003407"],"corresponding_institution_ids":["https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01850447,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"24","issue":"7","first_page":"5632","last_page":"5648"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8544430136680603},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7404394745826721},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7376017570495605},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.5126411318778992},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4893729090690613},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4342368245124817},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40630286931991577},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16159021854400635}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8544430136680603},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7404394745826721},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7376017570495605},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.5126411318778992},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4893729090690613},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4342368245124817},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40630286931991577},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16159021854400635}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2025.3534861","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3534861","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G277891089","display_name":null,"funder_award_id":"62302445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W376198888","https://openalex.org/W1502927489","https://openalex.org/W1589843374","https://openalex.org/W2010142417","https://openalex.org/W2039223179","https://openalex.org/W2063145953","https://openalex.org/W2086298846","https://openalex.org/W2087173276","https://openalex.org/W2116717571","https://openalex.org/W2117362057","https://openalex.org/W2117987582","https://openalex.org/W2122669112","https://openalex.org/W2124926080","https://openalex.org/W2131043660","https://openalex.org/W2132257180","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2157754486","https://openalex.org/W2161214567","https://openalex.org/W2397790717","https://openalex.org/W2508855287","https://openalex.org/W2734150319","https://openalex.org/W2737714914","https://openalex.org/W2771808514","https://openalex.org/W2797246528","https://openalex.org/W2886749079","https://openalex.org/W2965759621","https://openalex.org/W3110516712","https://openalex.org/W3159761532","https://openalex.org/W4214848001","https://openalex.org/W4381946520","https://openalex.org/W6661989311","https://openalex.org/W6776107011"],"related_works":["https://openalex.org/W2021087413","https://openalex.org/W2359085393","https://openalex.org/W2377774403","https://openalex.org/W2237863779","https://openalex.org/W2156083280","https://openalex.org/W2387329106","https://openalex.org/W2969720675","https://openalex.org/W2557836603","https://openalex.org/W2090295280","https://openalex.org/W2565480008"],"abstract_inverted_index":{"Cloud":[0],"storage":[1,206],"makes":[2],"it":[3,14,163],"easier":[4],"for":[5,122,154],"users":[6,104],"to":[7,21,65,103,150],"access":[8,41,78,94,101,119],"and":[9,33,77,186,195,205],"share":[10],"data":[11,28,31,81,84],"remotely,":[12],"but":[13,86,145],"often":[15],"requires":[16],"integration":[17],"with":[18,129,158],"cryptographic":[19],"technologies":[20],"address":[22],"consumer-oriented":[23],"applications,":[24],"such":[25],"as":[26],"fine-grained":[27,40],"access,":[29],"secure":[30,175],"sharing":[32],"retrieval.":[34],"This":[35],"paper":[36],"focuses":[37],"on":[38,47,57,126],"the":[39,130,165,177,181,197],"problem":[42],"of":[43,167,202],"media":[44,54,123,148],"applications":[45,55],"based":[46,56],"time":[48,58,108,131,156],"sequence,":[49],"that":[50,99,190],"is,":[51],"certain":[52],"critical":[53],"sequences":[59],"should":[60],"ideally":[61],"be":[62],"accessible":[63],"only":[64,136],"authorized":[66],"clients.":[67],"The":[68],"traditional":[69],"keyword-based":[70],"searchable":[71],"encryption":[72],"(SE)":[73],"allows":[74,147],"effective":[75],"search":[76,139],"over":[79],"encrypted":[80],"while":[82],"preserving":[83],"privacy,":[85],"most":[87],"existing":[88],"solutions":[89,199],"do":[90],"not":[91,135],"support":[92],"temporal":[93],"control":[95,120,128,151],"(i.e.,":[96],"a":[97,106],"mechanism":[98],"grants":[100],"permissions":[102],"within":[105],"specified":[107],"range).":[109],"In":[110,170],"this":[111],"paper,":[112],"we":[113],"propose":[114],"PAC-MC,":[115],"an":[116,159],"efficient":[117,194],"password-based":[118],"framework":[121],"cloud":[124],"relying":[125],"content":[127],"sequence":[132],"attribute.":[133],"PAC-MC":[134,172,191],"supports":[137,164],"multi-keyword":[138],"using":[140],"any":[141],"monotonic":[142],"boolean":[143],"formulas":[144],"also":[146],"owners":[149],"content-encryption":[152,168],"keys":[153],"different":[155],"periods":[157],"updatable":[160],"password.":[161],"Furthermore,":[162],"self-retrieval":[166],"keys.":[169],"addition,":[171],"is":[173,192],"provably":[174],"under":[176],"standard":[178],"model.":[179],"Finally,":[180],"detailed":[182],"performance":[183],"evaluation":[184],"results":[185],"experimental":[187],"comparisons":[188],"indicate":[189],"very":[193],"outperforms":[196],"previous":[198],"in":[200],"terms":[201],"computation,":[203],"communication,":[204],"costs.":[207]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
