{"id":"https://openalex.org/W3198899643","doi":"https://doi.org/10.1109/tr.2021.3103906","title":"A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System","display_name":"A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System","publication_year":2021,"publication_date":"2021-09-01","ids":{"openalex":"https://openalex.org/W3198899643","doi":"https://doi.org/10.1109/tr.2021.3103906","mag":"3198899643"},"language":"en","primary_location":{"id":"doi:10.1109/tr.2021.3103906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2021.3103906","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100784119","display_name":"Changbo Ke","orcid":"https://orcid.org/0000-0001-8120-5005"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Changbo Ke","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-9273-4428","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040734784","display_name":"Jiayu Wu","orcid":"https://orcid.org/0000-0002-7879-0626"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayu Wu","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100602821","display_name":"Fu Xiao","orcid":"https://orcid.org/0000-0003-1815-2793"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fu Xiao","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-1815-2793","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025184050","display_name":"Zhiqiu Huang","orcid":"https://orcid.org/0000-0001-6843-1892"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiu Huang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-6843-1892","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059299524","display_name":"Yunfei Meng","orcid":"https://orcid.org/0000-0002-8751-6338"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunfei Meng","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-8751-6338","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100784119"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":2.6667,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.91541882,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"71","issue":"4","first_page":"1513","last_page":"1526"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7988750338554382},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7607957720756531},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7418345808982849},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.574928343296051},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.573388934135437},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5129117965698242},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47229912877082825},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4324474632740021},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3620367646217346},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07996469736099243},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.06782323122024536}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7988750338554382},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7607957720756531},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7418345808982849},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.574928343296051},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.573388934135437},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5129117965698242},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47229912877082825},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4324474632740021},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3620367646217346},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07996469736099243},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.06782323122024536},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tr.2021.3103906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2021.3103906","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1443953771","display_name":null,"funder_award_id":"2018GXNSFAA050046","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"},{"id":"https://openalex.org/G7519372242","display_name":null,"funder_award_id":"61602262","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W285544433","https://openalex.org/W2013611975","https://openalex.org/W2058347046","https://openalex.org/W2060821931","https://openalex.org/W2076004681","https://openalex.org/W2285144687","https://openalex.org/W2518093493","https://openalex.org/W2545401907","https://openalex.org/W2606378336","https://openalex.org/W2616243981","https://openalex.org/W2617428507","https://openalex.org/W2625481008","https://openalex.org/W2714550548","https://openalex.org/W2755200181","https://openalex.org/W2765638825","https://openalex.org/W2786337055","https://openalex.org/W2794288783","https://openalex.org/W2888685578","https://openalex.org/W2911619360","https://openalex.org/W2912254402","https://openalex.org/W2917557947","https://openalex.org/W2918569291","https://openalex.org/W2919541342","https://openalex.org/W2919717192","https://openalex.org/W2936201262","https://openalex.org/W2946701076","https://openalex.org/W2963491455","https://openalex.org/W2969381679","https://openalex.org/W2987473969","https://openalex.org/W2997619936","https://openalex.org/W2998968733","https://openalex.org/W3004617812","https://openalex.org/W3036969479","https://openalex.org/W3043465744","https://openalex.org/W6696105951"],"related_works":["https://openalex.org/W3008339103","https://openalex.org/W2404647514","https://openalex.org/W1667647204","https://openalex.org/W4247536566","https://openalex.org/W3119814709","https://openalex.org/W2018477250","https://openalex.org/W1508895727","https://openalex.org/W4241418540","https://openalex.org/W2725786787","https://openalex.org/W4283160672"],"abstract_inverted_index":{"In":[0,60,125],"the":[1,9,32,37,52,79,84,90,101,126,128,143,145,155,166,176],"fog":[2,34,49,70,96],"computing,":[3],"it":[4],"is":[5,87,150],"difficult":[6],"to":[7,31,77,142],"satisfy":[8],"security":[10],"and":[11,51,54,93,117,130,139,159,168],"privacy":[12,55],"requirement":[13],"for":[14,43,48,69,95,106,114,163],"traditional":[15],"access":[16,22,26,73,157,161],"control":[17,23,27,74,158,162],"system,":[18],"such":[19],"as":[20],"attribute-based":[21],"system.":[24,75],"Risk-based":[25],"system":[28,112,121],"can":[29],"adapt":[30],"dynamic":[33,160],"environment.":[35],"However,":[36],"existing":[38],"risk":[39,66,82,85,102,115,122,148],"schemes":[40],"are":[41,57,135,173],"modeled":[42,88],"users":[44],"in":[45,72],"majority,":[46],"not":[47],"nodes,":[50],"context":[53,94],"sensitivity":[56],"rarely":[58],"considered.":[59],"this":[61,171],"article,":[62],"we":[63,99,110],"propose":[64],"a":[65],"assessment":[67,86,103,116,123],"scheme":[68,172],"nodes":[71],"Firstly,":[76],"improve":[78],"accuracy":[80,146],"of":[81,132,147,154,170],"score,":[83],"with":[89],"subject,":[91],"object,":[92],"nodes;":[97],"Secondly,":[98],"address":[100],"computing":[104,133],"module":[105],"every":[107],"component.":[108],"Moreover,":[109],"depict":[111],"model":[113,134],"implement":[118],"its":[119],"prototype":[120],"model.":[124],"end,":[127],"reasonability":[129],"correctness":[131],"analyzed":[136],"by":[137],"proving":[138],"simulation.":[140],"According":[141],"experiments,":[144],"score":[149],"higher":[151],"than":[152],"that":[153],"work-based":[156],"IoT.":[164],"Therefore,":[165],"feasibility":[167],"effectiveness":[169],"proved":[174],"through":[175],"experiments.":[177]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
