{"id":"https://openalex.org/W2526477928","doi":"https://doi.org/10.1109/tcc.2015.2469662","title":"Flexible Data Access Control Based on Trust and Reputation in Cloud Computing","display_name":"Flexible Data Access Control Based on Trust and Reputation in Cloud Computing","publication_year":2015,"publication_date":"2015-08-18","ids":{"openalex":"https://openalex.org/W2526477928","doi":"https://doi.org/10.1109/tcc.2015.2469662","mag":"2526477928"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2015.2469662","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2015.2469662","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078219471","display_name":"Zheng Yan","orcid":"https://orcid.org/0000-0002-9697-2108"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zheng Yan","raw_affiliation_strings":["Department of Communications and Networking, Otakaari 5, Espoo, Finland","State Key Lab of Integrated Services Networks, Xidian University, Xi\u2019an, China","State Key Lab of Integrated Services Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Department of Communications and Networking, Otakaari 5, Espoo, Finland","institution_ids":[]},{"raw_affiliation_string":"State Key Lab of Integrated Services Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Lab of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100552976","display_name":"Xueyun Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xueyun Li","raw_affiliation_strings":["Department of Communications and Networking, Otakaari 5, Espoo, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Communications and Networking, Otakaari 5, Espoo, Finland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100734754","display_name":"Mingjun Wang","orcid":"https://orcid.org/0000-0002-1020-3915"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingjun Wang","raw_affiliation_strings":["State Key Lab of Integrated Services Networks, Xidian University, Xi\u2019an, China","State Key Lab of Integrated Services Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Integrated Services Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Lab of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074022699","display_name":"Athanasios V. Vasilakos","orcid":"https://orcid.org/0000-0003-1902-9877"},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Athanasios V. Vasilakos","raw_affiliation_strings":["Lulea University of Technology, Sweden"],"affiliations":[{"raw_affiliation_string":"Lulea University of Technology, Sweden","institution_ids":["https://openalex.org/I190632392"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078219471"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":23.7294,"has_fulltext":false,"cited_by_count":142,"citation_normalized_percentile":{"value":0.99530796,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"5","issue":"3","first_page":"485","last_page":"498"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7969402074813843},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.778031587600708},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6488747596740723},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6395883560180664},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5784832835197449},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5640286207199097},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4737423360347748},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4477798044681549},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.43806248903274536},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42621710896492004},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4109656512737274},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3221035301685333},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10762637853622437}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7969402074813843},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.778031587600708},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6488747596740723},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6395883560180664},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5784832835197449},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5640286207199097},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4737423360347748},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4477798044681549},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.43806248903274536},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42621710896492004},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4109656512737274},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3221035301685333},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10762637853622437},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2015.2469662","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2015.2469662","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321394","display_name":"Aalto-Yliopisto","ror":"https://ror.org/020hwjq30"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W100863554","https://openalex.org/W1498316612","https://openalex.org/W1511886987","https://openalex.org/W1572593068","https://openalex.org/W1590823599","https://openalex.org/W1890078278","https://openalex.org/W1901742772","https://openalex.org/W1973422254","https://openalex.org/W1988646518","https://openalex.org/W1988818093","https://openalex.org/W1993341076","https://openalex.org/W1998586673","https://openalex.org/W2018840295","https://openalex.org/W2021781226","https://openalex.org/W2038512308","https://openalex.org/W2042220809","https://openalex.org/W2042695124","https://openalex.org/W2048543827","https://openalex.org/W2053368181","https://openalex.org/W2054079879","https://openalex.org/W2069229570","https://openalex.org/W2072343121","https://openalex.org/W2077573477","https://openalex.org/W2083570493","https://openalex.org/W2101238246","https://openalex.org/W2108072891","https://openalex.org/W2114428623","https://openalex.org/W2116626915","https://openalex.org/W2133487235","https://openalex.org/W2138001464","https://openalex.org/W2150475910","https://openalex.org/W2160262242","https://openalex.org/W2160390934","https://openalex.org/W2165464232","https://openalex.org/W2598466085","https://openalex.org/W4214651558","https://openalex.org/W6604066429","https://openalex.org/W6629862473","https://openalex.org/W6630803657","https://openalex.org/W6634295842","https://openalex.org/W6635176429","https://openalex.org/W6675086708"],"related_works":["https://openalex.org/W2376787749","https://openalex.org/W2008702788","https://openalex.org/W4200386038","https://openalex.org/W4309713563","https://openalex.org/W2389620320","https://openalex.org/W2022352978","https://openalex.org/W2554599470","https://openalex.org/W2589005689","https://openalex.org/W2733803478","https://openalex.org/W4210893852"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,184],"offers":[2],"a":[3,11,19,82,158,176,197,203,224],"new":[4],"way":[5],"of":[6,27,199,217,240,263],"services":[7],"and":[8,30,100,127,150,169,210,220,234,238,245,253,261],"has":[9],"become":[10],"popular":[12],"service":[13,39],"platform.":[14],"Storing":[15],"user":[16,28],"data":[17,21,46,56,77,93,97,104,144,164,180,191,267],"at":[18,79],"cloud":[20,38,80,92,163,183,271],"center":[22],"greatly":[23],"releases":[24],"storage":[25],"burden":[26],"devices":[29],"brings":[31],"access":[32,78,94,165,181,268],"convenience.":[33],"Due":[34],"to":[35,58,74,130,161,178,229],"distrust":[36],"in":[37,47,52,116,143,182,202,227,270],"providers,":[40],"users":[41],"generally":[42],"store":[43],"their":[44],"crucial":[45],"an":[48,66,70,125,140],"encrypted":[49],"form.":[50],"But":[51,154],"many":[53],"cases,":[54],"the":[55,135,190,215,258],"need":[57],"be":[59],"accessed":[60],"by":[61,189,196,206],"other":[62,136],"entities":[63],"for":[64,266],"fulfilling":[65],"expected":[67],"service,":[68],"e.g.,":[69],"eHealth":[71],"service.":[72],"How":[73],"control":[75,90,162,179,232,269],"personal":[76],"is":[81],"critical":[83],"issue.":[84],"Various":[85],"application":[86,101],"scenarios":[87,233],"request":[88],"flexible":[89,128,204],"on":[91,96,167,186],"based":[95,166,185],"owner":[98,192],"policies":[99],"demands.":[102],"Either":[103],"owners":[105],"or":[106,111],"some":[107],"trusted":[108],"third":[109],"parties":[110],"both":[112],"should":[113],"flexibly":[114],"participate":[115],"this":[117,132,172],"control.":[118],"However,":[119],"existing":[120],"work":[121],"hasn't":[122],"yet":[123],"investigated":[124],"effective":[126],"solution":[129,160],"satisfy":[131],"demand.":[133],"On":[134],"hand,":[137],"trust":[138,168,187,219],"plays":[139],"important":[141],"role":[142],"sharing.":[145],"It":[146],"helps":[147],"overcoming":[148],"uncertainty":[149],"avoiding":[151],"potential":[152],"risks.":[153],"literature":[155],"still":[156],"lacks":[157],"practical":[159],"reputation.":[170],"In":[171],"paper,":[173],"we":[174],"propose":[175],"scheme":[177,242,265],"evaluated":[188,244],"and/or":[193],"reputations":[194],"generated":[195],"number":[198],"reputation":[200,221],"centers":[201],"manner":[205],"applying":[207],"Attribue-Based":[208],"Encryption":[209],"Proxy":[211],"Re-Encryption.":[212],"We":[213],"integrate":[214],"concept":[216],"context-aware":[218],"evaluation":[222],"into":[223],"cryptographic":[225],"system":[226],"order":[228],"support":[230],"various":[231],"strategies.":[235],"The":[236,255],"security":[237,250],"performance":[239],"our":[241,264],"are":[243],"justified":[246],"through":[247],"extensive":[248],"analysis,":[249],"proof,":[251],"comparison":[252],"implementation.":[254],"results":[256],"show":[257],"efficiency,":[259],"flexibility":[260],"effectiveness":[262],"computing.":[272]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":22},{"year":2018,"cited_by_count":31},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":15}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
