{"id":"https://openalex.org/W2758714236","doi":"https://doi.org/10.1155/2017/2713595","title":"CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy","display_name":"CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2758714236","doi":"https://doi.org/10.1155/2017/2713595","mag":"2758714236"},"language":"en","primary_location":{"id":"doi:10.1155/2017/2713595","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/2713595","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/2713595.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2017/2713595.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077301818","display_name":"Nurmamat Helil","orcid":"https://orcid.org/0000-0001-9215-8638"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]},{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["CN","US"],"is_corresponding":true,"raw_author_name":"Nurmamat Helil","raw_affiliation_strings":["College of Mathematics and System Science, Xinjiang University, Xinjiang, China","Department of Computer Science and Engineering, University of Minnesota, Minneapolis, MN, USA"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and System Science, Xinjiang University, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Minnesota, Minneapolis, MN, USA","institution_ids":["https://openalex.org/I130238516"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111568181","display_name":"Kaysar Rahman","orcid":"https://orcid.org/0009-0007-5170-9916"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaysar Rahman","raw_affiliation_strings":["College of Mathematics and System Science, Xinjiang University, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and System Science, Xinjiang University, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077301818"],"corresponding_institution_ids":["https://openalex.org/I130238516","https://openalex.org/I96908189"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.285,"has_fulltext":true,"cited_by_count":43,"citation_normalized_percentile":{"value":0.91108293,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8057714700698853},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7817017436027527},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.7315141558647156},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5696590542793274},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.510999321937561},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5019524097442627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4903004467487335},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4580487310886383},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.4475564956665039},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4307648539543152},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42561036348342896},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.37748488783836365},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09795144200325012},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08765390515327454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8057714700698853},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7817017436027527},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.7315141558647156},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5696590542793274},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.510999321937561},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5019524097442627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4903004467487335},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4580487310886383},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.4475564956665039},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4307648539543152},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42561036348342896},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.37748488783836365},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09795144200325012},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08765390515327454},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2017/2713595","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/2713595","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/2713595.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ebd4b7b0bdaf4dcbacf18e929a32c89e","is_oa":true,"landing_page_url":"https://doaj.org/article/ebd4b7b0bdaf4dcbacf18e929a32c89e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2017 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2017/2713595","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/2713595","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/2713595.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2738073298","display_name":null,"funder_award_id":"11461069","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5774855291","display_name":null,"funder_award_id":"11261057","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7033253288","display_name":null,"funder_award_id":"Grants","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7263261342","display_name":null,"funder_award_id":"61562085","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309636","display_name":"University of Minnesota","ror":"https://ror.org/03grvy078"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2758714236.pdf","grobid_xml":"https://content.openalex.org/works/W2758714236.grobid-xml"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W2125719308","https://openalex.org/W2141696417","https://openalex.org/W2154765153","https://openalex.org/W2158284923","https://openalex.org/W2166602595","https://openalex.org/W2751376120"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2945232779","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W1969771171","https://openalex.org/W318167434"],"abstract_inverted_index":{"CP-ABE":[0,91],"(Ciphertext-Policy":[1],"Attribute-Based":[2],"Encryption)":[3],"with":[4,20,95],"hidden":[5,96,109,144],"access":[6,26,39,92,127],"control":[7,27,93,128],"policy":[8,129,133,146],"enables":[9],"data":[10,16,42,47,77,85,101,152,159],"owners":[11],"to":[12,33,40,63,116,140],"share":[13],"their":[14],"encrypted":[15],"using":[17],"cloud":[18],"storage":[19],"authorized":[21],"users":[22,35],"while":[23],"keeping":[24],"the":[25,71,80,83,99,117,122,126,131,151,157,164],"policies":[28],"blinded.":[29],"However,":[30],"a":[31,41,51,90],"mechanism":[32],"prevent":[34],"from":[36],"achieving":[37],"successive":[38],"owner\u2019s":[43],"certain":[44],"number":[45],"of":[46,53,82,119,124],"objects,":[48,78],"which":[49],"present":[50],"conflict":[52],"interest":[54],"or":[55],"whose":[56],"combination":[57],"thereof":[58],"is":[59],"sensitive,":[60],"has":[61,166],"yet":[62],"be":[64],"studied.":[65],"In":[66,112],"this":[67],"paper,":[68],"we":[69],"analyze":[70],"underlying":[72],"relations":[73],"among":[74],"these":[75],"particular":[76],"introduce":[79],"concept":[81],"sensitive":[84,100,158],"set":[86,102,160,168],"constraint,":[87],"and":[88,130],"propose":[89],"scheme":[94,105],"attributes":[97],"for":[98],"constraint.":[103],"This":[104],"incorporates":[106],"extensible,":[107],"partially":[108,155],"constraint":[110,132,145,161],"policy.":[111],"our":[113],"scheme,":[114],"due":[115],"separation":[118],"duty":[120],"principle,":[121],"duties":[123],"enforcing":[125],"are":[134],"divided":[135],"into":[136],"two":[137],"independent":[138],"entities":[139],"enhance":[141],"security.":[142],"The":[143],"provides":[147],"flexibility":[148],"in":[149],"that":[150],"owner":[153],"can":[154],"change":[156],"structure":[162],"after":[163],"system":[165],"been":[167],"up.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
