{"id":"https://openalex.org/W3121483488","doi":"https://doi.org/10.1142/s0218194020500400","title":"An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network","display_name":"An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network","publication_year":2020,"publication_date":"2020-11-01","ids":{"openalex":"https://openalex.org/W3121483488","doi":"https://doi.org/10.1142/s0218194020500400","mag":"3121483488"},"language":"en","primary_location":{"id":"doi:10.1142/s0218194020500400","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218194020500400","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100457273","display_name":"Yunpeng Zhang","orcid":"https://orcid.org/0000-0001-6208-9571"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yunpeng Zhang","raw_affiliation_strings":["Department of Information and Logistics Technology, College of Technology, University of Houston, 4730 Calhoun Road #300, Houston, TX 77024, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information and Logistics Technology, College of Technology, University of Houston, 4730 Calhoun Road #300, Houston, TX 77024, USA","institution_ids":["https://openalex.org/I44461941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100352263","display_name":"Xin Liu","orcid":"https://orcid.org/0000-0002-7357-6671"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xin Liu","raw_affiliation_strings":["Surface Imaging US Imaging, CGG Services (U.S.), Inc., 10300 Town Park Drive, Houston, TX 77072, USA"],"affiliations":[{"raw_affiliation_string":"Surface Imaging US Imaging, CGG Services (U.S.), Inc., 10300 Town Park Drive, Houston, TX 77072, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100457273"],"corresponding_institution_ids":["https://openalex.org/I44461941"],"apc_list":null,"apc_paid":null,"fwci":0.3488,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76572712,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"30","issue":"11n12","first_page":"1851","last_page":"1865"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.8070211410522461},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7791804075241089},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.746691882610321},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5255888104438782},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5072705149650574},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.4968245327472687},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.47632676362991333},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.4720405340194702},{"id":"https://openalex.org/keywords/markup-language","display_name":"Markup language","score":0.4615142345428467},{"id":"https://openalex.org/keywords/inter-domain","display_name":"Inter-domain","score":0.45410358905792236},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.43995365500450134},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.41721096634864807},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4125726819038391},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.29168617725372314},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.18275189399719238},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14594265818595886},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12334531545639038}],"concepts":[{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.8070211410522461},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7791804075241089},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.746691882610321},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5255888104438782},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5072705149650574},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.4968245327472687},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.47632676362991333},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.4720405340194702},{"id":"https://openalex.org/C45874996","wikidata":"https://www.wikidata.org/wiki/Q37045","display_name":"Markup language","level":3,"score":0.4615142345428467},{"id":"https://openalex.org/C5111613","wikidata":"https://www.wikidata.org/wiki/Q3799443","display_name":"Inter-domain","level":4,"score":0.45410358905792236},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.43995365500450134},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.41721096634864807},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4125726819038391},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.29168617725372314},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.18275189399719238},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14594265818595886},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12334531545639038},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.0},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218194020500400","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218194020500400","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2052283299","https://openalex.org/W2069728203","https://openalex.org/W2070464595","https://openalex.org/W2083225594","https://openalex.org/W2097171586","https://openalex.org/W2098662896","https://openalex.org/W2123183083","https://openalex.org/W2217570753","https://openalex.org/W2305392566","https://openalex.org/W2789622866","https://openalex.org/W2889667639","https://openalex.org/W2911526921","https://openalex.org/W2913409138","https://openalex.org/W2985654567","https://openalex.org/W3045051554"],"related_works":["https://openalex.org/W2400010433","https://openalex.org/W2198182223","https://openalex.org/W1520745363","https://openalex.org/W2125709082","https://openalex.org/W2351416088","https://openalex.org/W2981186629","https://openalex.org/W2349247816","https://openalex.org/W130718849","https://openalex.org/W2587977107","https://openalex.org/W2375261751"],"abstract_inverted_index":{"The":[0,64],"distributed":[1],"multiple":[2],"autonomous":[3],"network":[4],"has":[5,34],"become":[6,35],"the":[7,43,97,101,105,109],"main":[8],"trend":[9],"of":[10,22,45],"modern":[11],"information":[12,38],"systems,":[13],"such":[14,28],"as":[15],"Cloud,":[16],"Service-Oriented":[17],"Architecture":[18],"(SOA)":[19],"and":[20,31,47,94],"Internet":[21],"Things":[23],"(IoT).":[24],"Access":[25,56,83],"control":[26,67,72,79,112],"in":[27],"a":[29,36,70],"heterogeneous":[30],"dynamic":[32],"system":[33],"major":[37],"security":[39,102],"challenge,":[40],"which":[41],"hinders":[42],"sharing":[44],"resources":[46],"information.":[48],"In":[49],"this":[50],"work,":[51],"we":[52],"present":[53],"an":[54],"Attribute-Based":[55],"Control":[57,84],"(ABAC)":[58],"model":[59,68,99],"for":[60],"cross-domain":[61,77,110],"access":[62,66,78,111],"control.":[63],"proposed":[65,98],"comprises":[69],"boundary":[71,107],"server":[73],"designed":[74],"to":[75],"provide":[76],"capability.":[80],"An":[81],"eXtensible":[82],"Markup":[85],"Language":[86],"(XACML)":[87],"policy":[88],"model-based":[89],"implementation":[90,95],"is":[91],"introduced.":[92],"Process":[93],"show":[96],"alleviates":[100],"risk":[103],"on":[104],"domain":[106],"during":[108],"process.":[113]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
