{"id":"https://openalex.org/W3202850305","doi":"https://doi.org/10.1145/3473465.3473473","title":"A Multi-Tenant Access Control Method Based on Environmental Attributes and Security Labels","display_name":"A Multi-Tenant Access Control Method Based on Environmental Attributes and Security Labels","publication_year":2021,"publication_date":"2021-06-23","ids":{"openalex":"https://openalex.org/W3202850305","doi":"https://doi.org/10.1145/3473465.3473473","mag":"3202850305"},"language":"en","primary_location":{"id":"doi:10.1145/3473465.3473473","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3473465.3473473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 3rd International Conference on Information Technology and Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088307402","display_name":"Yubing Duan","orcid":null},"institutions":[{"id":"https://openalex.org/I2801345734","display_name":"China Academy of Engineering Physics","ror":"https://ror.org/039vqpp67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I2801345734"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yubing Duan","raw_affiliation_strings":["China Academy of Engineering Physics, China"],"affiliations":[{"raw_affiliation_string":"China Academy of Engineering Physics, China","institution_ids":["https://openalex.org/I2801345734"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103082944","display_name":"Xiaolei Deng","orcid":"https://orcid.org/0000-0002-2868-6310"},"institutions":[{"id":"https://openalex.org/I2801345734","display_name":"China Academy of Engineering Physics","ror":"https://ror.org/039vqpp67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I2801345734"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolei Deng","raw_affiliation_strings":["China Academy of Engineering Physics, China"],"affiliations":[{"raw_affiliation_string":"China Academy of Engineering Physics, China","institution_ids":["https://openalex.org/I2801345734"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101999981","display_name":"Haosen Yang","orcid":"https://orcid.org/0009-0004-4438-1578"},"institutions":[{"id":"https://openalex.org/I2801345734","display_name":"China Academy of Engineering Physics","ror":"https://ror.org/039vqpp67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I2801345734"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haosen Yang","raw_affiliation_strings":["China Academy of Engineering Physics, China"],"affiliations":[{"raw_affiliation_string":"China Academy of Engineering Physics, China","institution_ids":["https://openalex.org/I2801345734"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088307402"],"corresponding_institution_ids":["https://openalex.org/I2801345734"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23564313,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.9037476778030396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7719546556472778},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.7690188884735107},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6702447533607483},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6687068343162537},{"id":"https://openalex.org/keywords/physical-access","display_name":"Physical access","score":0.6399747133255005},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5878802537918091},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.5818189978599548},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5271298885345459},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.5230368375778198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49688270688056946},{"id":"https://openalex.org/keywords/discretionary-access-control","display_name":"Discretionary access control","score":0.4308139383792877},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3607344627380371},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3502234220504761},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07003414630889893},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06269925832748413}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.9037476778030396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7719546556472778},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.7690188884735107},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6702447533607483},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6687068343162537},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.6399747133255005},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5878802537918091},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.5818189978599548},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5271298885345459},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.5230368375778198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49688270688056946},{"id":"https://openalex.org/C48814466","wikidata":"https://www.wikidata.org/wiki/Q1228590","display_name":"Discretionary access control","level":4,"score":0.4308139383792877},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3607344627380371},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3502234220504761},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07003414630889893},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06269925832748413}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3473465.3473473","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3473465.3473473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 3rd International Conference on Information Technology and Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1986789244","https://openalex.org/W1997199359","https://openalex.org/W2070846709","https://openalex.org/W2082666822","https://openalex.org/W2090591807","https://openalex.org/W2108072891","https://openalex.org/W2110264892","https://openalex.org/W2134894205","https://openalex.org/W2138001464","https://openalex.org/W2156885966","https://openalex.org/W2157034822","https://openalex.org/W2166602595","https://openalex.org/W2361289058","https://openalex.org/W2371880718","https://openalex.org/W2380105316","https://openalex.org/W2383105262","https://openalex.org/W2963572874","https://openalex.org/W7005805654"],"related_works":["https://openalex.org/W2770657926","https://openalex.org/W3023964565","https://openalex.org/W2148952798","https://openalex.org/W2382286253","https://openalex.org/W1596015467","https://openalex.org/W2054600748","https://openalex.org/W2358662376","https://openalex.org/W2183827907","https://openalex.org/W2362979444","https://openalex.org/W2384733598"],"abstract_inverted_index":{"Secure":[0],"access":[1,13,27,42,53,73,78],"control":[2,28,43,54,74,79],"is":[3],"a":[4,51],"key":[5],"technology":[6],"to":[7],"protect":[8],"cloud":[9,45],"data":[10],"from":[11],"unauthorized":[12],"and":[14,35,60,75],"achieve":[15,71],"safe":[16],"sharing":[17],"of":[18,24,41],"user":[19],"data.":[20],"On":[21],"the":[22,33,37,67],"basis":[23],"introducing":[25],"traditional":[26],"models,":[29],"this":[30],"paper":[31],"analyzed":[32],"problems":[34],"summarized":[36],"main":[38],"research":[39],"status":[40],"in":[44],"computing":[46],"environment.":[47],"Then":[48],"we":[49],"proposed":[50,68],"multi-tenant":[52],"method":[55,69],"based":[56],"on":[57],"environmental":[58],"attributes":[59],"security":[61],"labels.":[62],"Experimental":[63],"results":[64],"show":[65],"that":[66],"can":[70],"fine-grained":[72],"more":[76],"flexible":[77],"granularity.":[80]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
