{"id":"https://openalex.org/W4387339248","doi":"https://doi.org/10.1016/j.comnet.2023.110049","title":"DACP: Enforcing a dynamic access control policy in cross-domain environments","display_name":"DACP: Enforcing a dynamic access control policy in cross-domain environments","publication_year":2023,"publication_date":"2023-10-04","ids":{"openalex":"https://openalex.org/W4387339248","doi":"https://doi.org/10.1016/j.comnet.2023.110049"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.comnet.2023.110049","pdf_url":null,"source":{"id":"https://openalex.org/S63392143","display_name":"Computer Networks","issn_l":"1389-1286","issn":["1389-1286","1872-7069"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.comnet.2023.110049","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010636899","display_name":"Ahmad Salehi S.","orcid":"https://orcid.org/0000-0003-2115-6269"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ahmad Salehi S.","raw_affiliation_strings":["Department of Computer Science and Information Technology, La Trobe University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, La Trobe University, Melbourne, Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039629886","display_name":"Runchao Han","orcid":"https://orcid.org/0000-0002-9281-329X"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Runchao Han","raw_affiliation_strings":["Cybersecurity LAB (Dep of Software Systems & Cybersecurity), Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity LAB (Dep of Software Systems & Cybersecurity), Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086593836","display_name":"Carsten Rudolph","orcid":"https://orcid.org/0000-0001-9050-5675"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Carsten Rudolph","raw_affiliation_strings":["Cybersecurity LAB (Dep of Software Systems & Cybersecurity), Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity LAB (Dep of Software Systems & Cybersecurity), Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058516861","display_name":"Marthie Grobler","orcid":"https://orcid.org/0000-0001-6933-0145"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I4210091585","display_name":"Quantum (Australia)","ror":"https://ror.org/00bp6rb10","country_code":"AU","type":"company","lineage":["https://openalex.org/I4210091585"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Marthie Grobler","raw_affiliation_strings":["Cybersecurity and Quantum Systems (CQS), CSIRO's Data61, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity and Quantum Systems (CQS), CSIRO's Data61, Melbourne, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679","https://openalex.org/I4210091585"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010636899"],"corresponding_institution_ids":["https://openalex.org/I196829312"],"apc_list":{"value":2370,"currency":"USD","value_usd":2370,"provenance":"doaj"},"apc_paid":{"value":2370,"currency":"USD","value_usd":2370,"provenance":"doaj"},"fwci":2.416,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":6,"citation_normalized_percentile":{"value":0.999978,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"237","issue":null,"first_page":"110049","last_page":"110049"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Trust and Reputation Systems in Online Environments","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access Control","score":0.599001},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.56582},{"id":"https://openalex.org/keywords/role-based-authorization","display_name":"Role-Based Authorization","score":0.548335},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential Privacy","score":0.510973},{"id":"https://openalex.org/keywords/searchable-encryption","display_name":"Searchable Encryption","score":0.507289},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.44210318}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8663864},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8481386},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.57301116},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5501271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5483398},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5271135},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5233035},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.50150895},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.48775584},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47543076},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.45104527},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.44500306},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.44210318},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.24881929},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09663567},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.comnet.2023.110049","pdf_url":null,"source":{"id":"https://openalex.org/S63392143","display_name":"Computer Networks","issn_l":"1389-1286","issn":["1389-1286","1872-7069"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/DACP_Enforcing_a_dynamic_access_control_policy_in_cross-domain_environments/24282679","pdf_url":"https://figshare.com/articles/journal_contribution/DACP_Enforcing_a_dynamic_access_control_policy_in_cross-domain_environments/24282679/1/files/42692665.pdf","source":{"id":"https://openalex.org/S4306400572","display_name":"OPAL (Open@LaTrobe) (La Trobe University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I196829312","host_organization_name":"La Trobe University","host_organization_lineage":["https://openalex.org/I196829312"],"host_organization_lineage_names":["La Trobe University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/DACP_Enforcing_a_dynamic_access_control_policy_in_cross-domain_environments_Item/24282691","pdf_url":"https://figshare.com/articles/journal_contribution/DACP_Enforcing_a_dynamic_access_control_policy_in_cross-domain_environments_Item/24282691/2/files/42626734.pdf","source":{"id":"https://openalex.org/S4306402621","display_name":"INDIGO (University of Illinois at Chicago)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39422238","host_organization_name":"University of Illinois at Chicago","host_organization_lineage":["https://openalex.org/I39422238"],"host_organization_lineage_names":["University of Illinois at Chicago"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/0720aa2b-b25e-4a9b-bd04-26cca282a1f6","pdf_url":"https://research.monash.edu/files/567346039/556683261_oa.pdf","source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":["Monash University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.comnet.2023.110049","pdf_url":null,"source":{"id":"https://openalex.org/S63392143","display_name":"Computer Networks","issn_l":"1389-1286","issn":["1389-1286","1872-7069"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.75,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":42,"referenced_works":["https://openalex.org/W1585524716","https://openalex.org/W1777016212","https://openalex.org/W2014526433","https://openalex.org/W2037107113","https://openalex.org/W2048543827","https://openalex.org/W2216976257","https://openalex.org/W2343562430","https://openalex.org/W2417719071","https://openalex.org/W2530755607","https://openalex.org/W2603893109","https://openalex.org/W2738135234","https://openalex.org/W2744535758","https://openalex.org/W2757157199","https://openalex.org/W2790617931","https://openalex.org/W2793935299","https://openalex.org/W2806531551","https://openalex.org/W2890502336","https://openalex.org/W2914982603","https://openalex.org/W2976086109","https://openalex.org/W2978282230","https://openalex.org/W2984674716","https://openalex.org/W2987473969","https://openalex.org/W2997837815","https://openalex.org/W3002823324","https://openalex.org/W3023755596","https://openalex.org/W3023901165","https://openalex.org/W3102399356","https://openalex.org/W3123491145","https://openalex.org/W3130685565","https://openalex.org/W3131406583","https://openalex.org/W4225113328","https://openalex.org/W4225147781","https://openalex.org/W4229984405","https://openalex.org/W4238869514","https://openalex.org/W4244102997","https://openalex.org/W4244206418","https://openalex.org/W4245729972","https://openalex.org/W4249192545","https://openalex.org/W4251058690","https://openalex.org/W4252506956","https://openalex.org/W4256157283","https://openalex.org/W4281822694"],"related_works":["https://openalex.org/W2555738791","https://openalex.org/W2379813727","https://openalex.org/W2378367493","https://openalex.org/W2367441718","https://openalex.org/W2357728851","https://openalex.org/W2355345331","https://openalex.org/W2095975812","https://openalex.org/W2017675414","https://openalex.org/W1990260561","https://openalex.org/W1593822213"],"abstract_inverted_index":{"Enabling":[0],"hybrid":[1],"authorisations":[2],"to":[3,11,131],"enforce":[4,74],"dynamic":[5,102],"access":[6,70,124,158],"control":[7,71,125],"policy":[8,72,128],"from":[9],"single-domain":[10],"cross-domain":[12,103],"environments":[13],"(CDEs)":[14],"is":[15,56,120,137,187],"important":[16],"for":[17,122,139],"distributed":[18,154],"services.":[19],"However,":[20],"traditional":[21,107],"Attribute-Based":[22],"Access":[23,97],"Control":[24,98],"(ABAC)":[25],"models":[26],"are":[27,152],"incompatible":[28],"with":[29,60,156],"CDEs.":[30,192],"To":[31],"fill":[32],"this":[33,88],"gap,":[34],"approaches":[35],"that":[36,185],"apply":[37],"cryptographic":[38,113],"primitives,":[39],"e.g.,":[40],"attribute-based":[41],"encryption":[42],"(ABE),":[43],"have":[44],"been":[45],"proposed.":[46],"The":[47,182],"computation":[48],"and":[49,58,84,110,127,146,172,176,189],"storage":[50],"overhead":[51],"in":[52,77,160,179,191],"most":[53,69],"ABE":[54],"constructions":[55],"non-negligible":[57],"increases":[59],"the":[61,64,123,132,141,149,157,164,169],"complexity":[62],"of":[63,174],"associated":[65],"policies.":[66],"In":[67,87],"addition,":[68],"systems":[73],"authorisation":[75],"policies":[76],"a":[78,94,111],"centralized":[79],"way,":[80],"raising":[81],"serious":[82],"security":[83],"privacy":[85],"issues.":[86],"paper,":[89],"we":[90],"introduce":[91],"DACP":[92,105,186],"\u2013":[93],"practical":[95,188],"Dynamic":[96],"Policy":[99],"system":[100],"supporting":[101],"authorisation.":[104],"combines":[106],"ABAC":[108,119],"approach":[109],"novel":[112],"primitive":[114],"Attribute-based":[115],"group":[116],"signature":[117],"(ABGS).":[118],"used":[121,138],"decision":[126],"enforcement":[129],"according":[130],"user's":[133,142,150,165],"attributes":[134,143,151],"whereas":[135],"ABGS":[136],"managing":[140],"between":[144],"users":[145],"authorities.":[147],"Thus,":[148],"securely":[153],"along":[155],"structure":[159],"CDEs":[161],"while":[162],"preserving":[163],"privacy.":[166],"We":[167],"present":[168],"concrete":[170],"design":[171],"implementation":[173],"DACP,":[175],"evaluate":[177],"it":[178],"real-world":[180],"settings.":[181],"evaluation":[183],"shows":[184],"efficient":[190]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387339248","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3}],"updated_date":"2024-11-18T09:59:16.705358","created_date":"2023-10-05"}