{"id":"https://openalex.org/W2069462872","doi":"https://doi.org/10.4304/jcp.8.5.1220-1229","title":"Model of Domain based RBAC and Supporting Technologies","display_name":"Model of Domain based RBAC and Supporting Technologies","publication_year":2013,"publication_date":"2013-04-19","ids":{"openalex":"https://openalex.org/W2069462872","doi":"https://doi.org/10.4304/jcp.8.5.1220-1229","mag":"2069462872"},"language":"en","primary_location":{"id":"doi:10.4304/jcp.8.5.1220-1229","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.8.5.1220-1229","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017586277","display_name":"Zan Yang","orcid":"https://orcid.org/0000-0002-1813-1768"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zan Yang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101884318","display_name":"Lin Yang","orcid":"https://orcid.org/0000-0003-4341-7132"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lin Yang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090509213","display_name":"Xiangyang Luo","orcid":"https://orcid.org/0000-0003-3225-4649"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiang-yang Luo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102110828","display_name":"Ma Lin-ru","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lin-ru Ma","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030246658","display_name":"Bao-sheng Kou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bao-sheng Kou","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100342307","display_name":"Kun Zhang","orcid":"https://orcid.org/0000-0002-0296-8125"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kun Zhang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5017586277"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.8015,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.96817212,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"8","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.9069488048553467},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.709820032119751},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5979894399642944},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3027956187725067},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.23435857892036438},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.04001232981681824}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.9069488048553467},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.709820032119751},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5979894399642944},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3027956187725067},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.23435857892036438},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.04001232981681824},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jcp.8.5.1220-1229","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.8.5.1220-1229","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W53342935","https://openalex.org/W1649481791","https://openalex.org/W1898259180","https://openalex.org/W1972704595","https://openalex.org/W1992435849","https://openalex.org/W1997199359","https://openalex.org/W2060690494","https://openalex.org/W2076004681","https://openalex.org/W2090932578","https://openalex.org/W2110333423","https://openalex.org/W2116854816","https://openalex.org/W2123479684","https://openalex.org/W2139115530","https://openalex.org/W2147986718","https://openalex.org/W2152717486","https://openalex.org/W2166602595","https://openalex.org/W2208395198","https://openalex.org/W2367641558","https://openalex.org/W3142229452","https://openalex.org/W3149672956","https://openalex.org/W4205471131","https://openalex.org/W6602238972","https://openalex.org/W6639539628","https://openalex.org/W6676173721","https://openalex.org/W6680604652"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2372156812","https://openalex.org/W1582127221","https://openalex.org/W3102845218","https://openalex.org/W2392979115","https://openalex.org/W2356011375","https://openalex.org/W2945232779","https://openalex.org/W2360246581","https://openalex.org/W2355647610"],"abstract_inverted_index":{"Nowadays":[0],"the":[1,4,33,36,59,65,69,75,81,105,109,115,127,138,168,181,192,199],"significance":[2],"of":[3,23,35,56,67,96,108,170,183,201],"access":[5,17,185],"control":[6,18],"technology":[7],"in":[8,87,203],"service":[9],"oriented":[10],"network":[11,37,40],"is":[12,52],"increasingly":[13],"highlighted.":[14],"The":[15,151,172,187],"RBAC":[16,62,70,84,99,202],"model":[19,63,95,119,140,190],"has":[20,160],"a":[21,39,54,94,123],"variety":[22],"advantages":[24],"such":[25],"as":[26,64],"easy":[27],"management":[28],"and":[29,74,118,120,141,167,191],"high":[30],"efficiency.":[31],"With":[32],"expansion":[34],"scale,":[38],"must":[41],"be":[42],"divided":[43],"into":[44],"autonomous":[45],"multi-domains":[46],"for":[47,80,137,164],"convenient":[48],"management.":[49],"However,":[50],"there":[51],"still":[53],"lack":[55],"studies":[57],"on":[58,143],"domain":[60,82,97,116,175],"based":[61,83,98,142],"barrier":[66],"applying":[68],"to":[71,101,104,126,157],"multi-domain":[72,110,204],"environment,":[73],"corresponding":[76],"supporting":[77,149,194],"implementation":[78,135],"technologies":[79,195],"are":[85],"also":[86],"weak.":[88],"In":[89],"this":[90,144],"paper,":[91],"we":[92,132,146],"proposed":[93,128,147,188],"(D-RBAC)":[100],"better":[102],"adapt":[103],"security":[106],"requirements":[107],"environment.":[111],"We":[112],"firstly":[113],"introduced":[114],"concept":[117],"then":[121],"gave":[122],"formal":[124],"description":[125,162],"D-RBAC":[129,139,189],"model.":[130],"Secondly,":[131],"designed":[133],"feasible":[134],"architecture":[136,145],"two":[148],"technologies.":[150],"fuzzy":[152],"role":[153,165],"mapping":[154],"method":[155],"according":[156],"user\u2019s":[158],"attributes":[159],"strong":[161],"abilities":[163],"assignment":[166],"convenience":[169],"realization.":[171],"dynamic":[173],"collaboration":[174],"construction":[176],"framework":[177],"can":[178,196],"greatly":[179],"improve":[180],"efficiency":[182],"inter-domain":[184],"control.":[186],"related":[193],"obviously":[197],"facilitate":[198],"application":[200],"environment":[205]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
