{"id":"https://openalex.org/W4327520959","doi":"https://doi.org/10.1145/3573428.3573622","title":"Simplifying Access Policy Descriptions with Level Relationships between Attributes","display_name":"Simplifying Access Policy Descriptions with Level Relationships between Attributes","publication_year":2022,"publication_date":"2022-10-21","ids":{"openalex":"https://openalex.org/W4327520959","doi":"https://doi.org/10.1145/3573428.3573622"},"language":"en","primary_location":{"id":"doi:10.1145/3573428.3573622","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3573428.3573622","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039913410","display_name":"Xiangwu Ding","orcid":"https://orcid.org/0000-0002-3990-3595"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangwu Ding","raw_affiliation_strings":["College of Computer Science and Technology, Donghua University, China"],"raw_orcid":"https://orcid.org/0000-0002-3990-3595","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Donghua University, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047470617","display_name":"Wangsheng Wang","orcid":"https://orcid.org/0000-0003-2659-2553"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wangsheng Wang","raw_affiliation_strings":["College of Computer Science and Technology, Donghua University, China"],"raw_orcid":"https://orcid.org/0000-0003-2659-2553","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Donghua University, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023655949","display_name":"Jiale Feng","orcid":"https://orcid.org/0000-0002-9163-1507"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiale Feng","raw_affiliation_strings":["Shanghai Zhongheng Software Technology Co., Ltd., China"],"raw_orcid":"https://orcid.org/0000-0002-9163-1507","affiliations":[{"raw_affiliation_string":"Shanghai Zhongheng Software Technology Co., Ltd., China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039913410"],"corresponding_institution_ids":["https://openalex.org/I181326427"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17946518,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1083","last_page":"1088"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8480180501937866},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.78583824634552},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7722768783569336},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.6375660300254822},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.5916303992271423},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5723633170127869},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5692702531814575},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5548202991485596},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5514567494392395},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5490522384643555},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5024433135986328},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.44824302196502686},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.43064019083976746},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.36390382051467896},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29199737310409546},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23975449800491333},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.13062205910682678}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8480180501937866},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78583824634552},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7722768783569336},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.6375660300254822},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.5916303992271423},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5723633170127869},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5692702531814575},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5548202991485596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5514567494392395},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5490522384643555},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5024433135986328},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.44824302196502686},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.43064019083976746},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.36390382051467896},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29199737310409546},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23975449800491333},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.13062205910682678},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3573428.3573622","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3573428.3573622","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W2810011639","https://openalex.org/W2845081339","https://openalex.org/W3083588999","https://openalex.org/W3199557270"],"related_works":["https://openalex.org/W2788225348","https://openalex.org/W2553096087","https://openalex.org/W2530459946","https://openalex.org/W2125192202","https://openalex.org/W2282054813","https://openalex.org/W1663161527","https://openalex.org/W2147871863","https://openalex.org/W4206042844","https://openalex.org/W3158270748","https://openalex.org/W2015185390"],"abstract_inverted_index":{"Blockchain":[0],"combined":[1],"with":[2],"distributed":[3],"file":[4],"system":[5],"for":[6],"storing":[7],"data":[8,15,91,133],"usually":[9],"encounters":[10],"the":[11,51,67,74,83,96,99,103,107,113,121,132,139,165,170],"challenges":[12],"of":[13,34,53,85,145,169],"sensitive":[14],"protection":[16],"and":[17,21,78,112,135,159,167],"secure":[18],"access":[19,25,38,46,55,62,75,97,108,122],"control,":[20],"ABE":[22],"can":[23,40],"achieve":[24],"control":[26,63],"to":[27,42,72,81,119,130,141],"confidential":[28],"data.":[29,87,146],"However,":[30],"an":[31,37,61],"excessive":[32],"number":[33],"attributes":[35,71,104],"in":[36,106,138],"policy":[39,47,56,76,109,123],"lead":[41],"a":[43,148],"very":[44],"complex":[45,54],"description.":[48],"To":[49],"solve":[50],"problem":[52],"descriptions,":[57],"this":[58],"paper":[59],"proposes":[60],"scheme":[64,89,171],"that":[65],"utilizes":[66],"level":[68,100,115],"relationship":[69,101],"between":[70,102],"simplify":[73,120],"descriptions":[77],"combines":[79],"blockchain":[80,140,155],"protect":[82],"security":[84],"encrypted":[86],"This":[88],"encrypts":[90],"through":[92,156],"CP-ABE.":[93],"When":[94],"formulating":[95],"policy,":[98],"involved":[105],"is":[110,117,128],"analyzed":[111],"attribute":[114,136],"structure":[116],"constructed":[118,129],"descriptions.":[124],"A":[125],"smart":[126],"contract":[127],"store":[131],"hash":[134],"ciphertext":[137],"avoid":[142],"malicious":[143],"tampering":[144],"Build":[147],"cross-regional":[149],"first-time":[150],"ID":[151],"card":[152],"claiming":[153],"consortium":[154],"FISCO":[157],"BCOS":[158],"build":[160],"IPFS":[161],"cluster.":[162],"Through":[163],"experiments,":[164],"feasibility":[166],"effectiveness":[168],"are":[172],"verified.":[173]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
