{"id":"https://openalex.org/W4366202483","doi":"https://doi.org/10.1186/s13677-023-00444-4","title":"Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment","display_name":"Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment","publication_year":2023,"publication_date":"2023-04-18","ids":{"openalex":"https://openalex.org/W4366202483","doi":"https://doi.org/10.1186/s13677-023-00444-4"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-023-00444-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00444-4","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00444-4","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00444-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100768483","display_name":"Yan Liang","orcid":"https://orcid.org/0000-0002-7845-6484"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liang Yan","raw_affiliation_strings":["Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]},{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064694591","display_name":"Lina Ge","orcid":"https://orcid.org/0000-0001-6872-7933"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]},{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Ge","raw_affiliation_strings":["Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi Minzu University, 530006, Nanning, China","Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I150807315"]},{"raw_affiliation_string":"Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]},{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407591","display_name":"Zhe Wang","orcid":"https://orcid.org/0000-0001-9727-5569"},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]},{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi Minzu University, 530006, Nanning, China","Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I150807315"]},{"raw_affiliation_string":"Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]},{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006044088","display_name":"Guifen Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guifen Zhang","raw_affiliation_strings":["Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]},{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077369344","display_name":"Jingya Xu","orcid":"https://orcid.org/0000-0002-4951-098X"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]},{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingya Xu","raw_affiliation_strings":["Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","School of Electronic Information, Guangxi Minzu University, 530006, Nanning, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]},{"raw_affiliation_string":"School of Electronic Information, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I150807315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100430498","display_name":"Zheng Hu","orcid":"https://orcid.org/0000-0001-5008-6015"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Hu","raw_affiliation_strings":["Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Communication Engineering, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]},{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, 530006, Nanning, China","institution_ids":["https://openalex.org/I145897649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100768483"],"corresponding_institution_ids":["https://openalex.org/I145897649"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":7.5899,"has_fulltext":true,"cited_by_count":44,"citation_normalized_percentile":{"value":0.97923646,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"12","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8007245659828186},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7178625464439392},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7175172567367554},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6764781475067139},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6100419759750366},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.5817013382911682},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5755099654197693},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5558491945266724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5033161044120789},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4206307530403137},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.415127158164978},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37578994035720825},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24502378702163696},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12542685866355896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8007245659828186},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7178625464439392},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7175172567367554},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6764781475067139},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6100419759750366},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.5817013382911682},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5755099654197693},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5558491945266724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5033161044120789},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4206307530403137},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.415127158164978},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37578994035720825},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24502378702163696},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12542685866355896}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-023-00444-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00444-4","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00444-4","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e678bc258d9d427f89854582d432b3d1","is_oa":true,"landing_page_url":"https://doaj.org/article/e678bc258d9d427f89854582d432b3d1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-16 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-023-00444-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00444-4","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00444-4","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4477226527","display_name":null,"funder_award_id":"61862007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5090038883","display_name":null,"funder_award_id":"2020GXNSFBA297103","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4366202483.pdf"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1997199359","https://openalex.org/W2102100462","https://openalex.org/W2108072891","https://openalex.org/W2158284923","https://openalex.org/W2276075364","https://openalex.org/W2760477892","https://openalex.org/W2788694634","https://openalex.org/W2795144752","https://openalex.org/W2876503617","https://openalex.org/W2897525439","https://openalex.org/W2898082692","https://openalex.org/W2899113193","https://openalex.org/W2910199432","https://openalex.org/W2910358275","https://openalex.org/W2922265937","https://openalex.org/W2923615625","https://openalex.org/W2975691524","https://openalex.org/W2975871742","https://openalex.org/W2992190041","https://openalex.org/W2996405275","https://openalex.org/W3000548332","https://openalex.org/W3002761878","https://openalex.org/W3011992028","https://openalex.org/W3022091783","https://openalex.org/W3023514294","https://openalex.org/W3025322385","https://openalex.org/W3027316238","https://openalex.org/W3038980495","https://openalex.org/W3048247585","https://openalex.org/W3112962245","https://openalex.org/W3157388390","https://openalex.org/W3162648243","https://openalex.org/W3166266336","https://openalex.org/W3175862181","https://openalex.org/W4229450262","https://openalex.org/W4284966003","https://openalex.org/W4291178412","https://openalex.org/W4293066331"],"related_works":["https://openalex.org/W4223919663","https://openalex.org/W1582239555","https://openalex.org/W1574326402","https://openalex.org/W2982130125","https://openalex.org/W4285255193","https://openalex.org/W3031006976","https://openalex.org/W1905687471","https://openalex.org/W4225688985","https://openalex.org/W2042220809","https://openalex.org/W4210637431"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,27,31,37,47,53,114,117,123,132,135],"rapid":[3],"development":[4],"of":[5,36,49,55,138],"cloud":[6,15,82],"computing":[7],"technology,":[8],"how":[9],"to":[10,14,29,61,154,159,172],"achieve":[11,30],"secure":[12,136],"access":[13,50,71,89,157,162],"data":[16,56,127],"has":[17,187],"become":[18],"a":[19,69],"current":[20],"research":[21],"hotspot.":[22],"Attribute-based":[23],"encryption":[24,80,98],"technology":[25],"provides":[26],"feasibility":[28],"above":[32],"goal.":[33],"However,":[34],"most":[35],"existing":[38],"solutions":[39],"have":[40],"high":[41,188],"computational":[42,189],"and":[43,52,77,99,105,116,129,144,175,180,190],"trust":[44],"costs.":[45],"Furthermore,":[46],"fairness":[48],"authorization":[51],"security":[54],"search":[57,137],"can":[58],"be":[59],"difficult":[60],"guarantee.":[62],"To":[63],"address":[64],"these":[65],"issues,":[66],"we":[67],"propose":[68],"novel":[70],"control":[72,90],"scheme":[73,86,133,169,186],"based":[74],"on":[75,122],"blockchain":[76,146],"attribute-based":[78],"searchable":[79],"in":[81,113,141],"environment.":[83,147],"The":[84,108],"proposed":[85],"achieves":[87],"fine-grained":[88],"with":[91],"low":[92],"computation":[93],"consumption":[94],"by":[95],"implementing":[96],"proxy":[97],"decryption,":[100],"while":[101],"supporting":[102],"policy":[103],"hiding":[104],"attribute":[106],"revocation.":[107],"encrypted":[109],"file":[110],"is":[111,120,152,170,194],"stored":[112,121],"IPFS":[115],"metadata":[118],"ciphertext":[119,139],"blockchain,":[124],"which":[125,193],"ensures":[126],"integrity":[128],"confidentiality.":[130],"Simultaneously,":[131],"enables":[134],"keyword":[140],"an":[142,149],"open":[143],"transparent":[145],"Additionally,":[148],"audit":[150],"contract":[151],"designed":[153],"constrain":[155],"user":[156],"behavior":[158],"dynamically":[160],"manage":[161],"authorization.":[163],"Security":[164],"analysis":[165,179],"proves":[166],"that":[167,184],"our":[168,185],"resistant":[171],"chosen-plaintext":[173],"attacks":[174],"keyword-guessing":[176],"attacks.":[177],"Theoretical":[178],"experimental":[181],"results":[182],"show":[183],"storage":[191],"efficiency,":[192],"more":[195],"advantageous":[196],"than":[197],"other":[198],"schemes.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
