{"id":"https://openalex.org/W2070042391","doi":"https://doi.org/10.4304/jcp.9.2.506-511","title":"The Design and Simulation of a New Dynamic Credit and Role based Access Control Strategy","display_name":"The Design and Simulation of a New Dynamic Credit and Role based Access Control Strategy","publication_year":2014,"publication_date":"2014-02-01","ids":{"openalex":"https://openalex.org/W2070042391","doi":"https://doi.org/10.4304/jcp.9.2.506-511","mag":"2070042391"},"language":"en","primary_location":{"id":"doi:10.4304/jcp.9.2.506-511","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.9.2.506-511","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033616367","display_name":"Haibo Gao","orcid":"https://orcid.org/0000-0002-6501-656X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Haibo Gao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101613451","display_name":"Wenjuan Zeng","orcid":"https://orcid.org/0000-0003-0878-1465"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenjuan Zeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5002611438","display_name":"Xiaohong Deng","orcid":"https://orcid.org/0000-0001-5821-5125"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaohong Deng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033616367"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9959,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.85436375,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.960099995136261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/controllability","display_name":"Controllability","score":0.7367719411849976},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7239807844161987},{"id":"https://openalex.org/keywords/economic-shortage","display_name":"Economic shortage","score":0.6728187203407288},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.6082432270050049},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5460304617881775},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5332275032997131},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.45251113176345825},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.43136733770370483},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.42387324571609497},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.33708974719047546},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.245889812707901},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.18208056688308716},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17430266737937927},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17114245891571045},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.09995588660240173},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07758113741874695}],"concepts":[{"id":"https://openalex.org/C48209547","wikidata":"https://www.wikidata.org/wiki/Q1331104","display_name":"Controllability","level":2,"score":0.7367719411849976},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7239807844161987},{"id":"https://openalex.org/C194051981","wikidata":"https://www.wikidata.org/wiki/Q1337691","display_name":"Economic shortage","level":3,"score":0.6728187203407288},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.6082432270050049},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5460304617881775},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5332275032997131},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.45251113176345825},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.43136733770370483},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.42387324571609497},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.33708974719047546},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.245889812707901},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.18208056688308716},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17430266737937927},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17114245891571045},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.09995588660240173},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07758113741874695},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jcp.9.2.506-511","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.9.2.506-511","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1509539496","https://openalex.org/W1554642114","https://openalex.org/W1658613573","https://openalex.org/W1976718239","https://openalex.org/W1981236833","https://openalex.org/W1984276269","https://openalex.org/W1991810434","https://openalex.org/W2031729344","https://openalex.org/W2074579664","https://openalex.org/W2076960130","https://openalex.org/W2088410925","https://openalex.org/W2095677682","https://openalex.org/W2096371059","https://openalex.org/W2123837566","https://openalex.org/W2143110378","https://openalex.org/W2144872259","https://openalex.org/W2993573971","https://openalex.org/W4285719527","https://openalex.org/W6681616800"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W1969771171","https://openalex.org/W819284483","https://openalex.org/W2370002471"],"abstract_inverted_index":{"In":[0,51],"order":[1,52],"to":[2,45,53,76,97],"solve":[3],"the":[4,7,85],"shortage":[5],"of":[6,57,91],"access":[8,23,33],"control":[9,24],"method":[10,25,29,87],"based":[11,22],"on":[12],"role":[13,21],"and":[14,20,39,42,72,95],"credit,":[15],"a":[16],"novel":[17],"dynamic":[18],"credit":[19,37,49,63,93],"is":[26],"proposed.":[27],"The":[28],"controls":[30],"an":[31,55],"entity\u2019s":[32,48,92],"behavior":[34],"through":[35],"its":[36],"value,":[38],"introduces":[40],"penalty":[41],"feedback":[43],"mechanism":[44],"dynamically":[46],"adjust":[47],"value.":[50],"manage":[54],"amount":[56],"entities":[58,60],"effectively,":[59],"with":[61],"different":[62,68],"values":[64],"are":[65,74],"divided":[66],"into":[67],"roles":[69,73],"in":[70],"system,":[71],"assigned":[75],"corresponding":[77],"privileges":[78],"respectively.":[79],"Experimental":[80],"simulation":[81],"results":[82],"showed":[83],"that":[84],"proposed":[86],"has":[88],"good":[89],"controllability":[90],"value":[94],"manipulability":[96],"protect":[98],"system\u2019s":[99],"resources.":[100]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
