Achieving Lightweight and Fine-grained Access Control in Mobile Cloud Computing Article Swipe
Yu Jin
,
Heng He
,
Chuan Tian
,
Yadan Wang
,
Wei Xia
·
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.5220/0006029605100515
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.5220/0006029605100515
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.5220/0006029605100515
- OA Status
- hybrid
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3155468001
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3155468001Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5220/0006029605100515Digital Object Identifier
- Title
-
Achieving Lightweight and Fine-grained Access Control in Mobile Cloud ComputingWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2015Year of publication
- Publication date
-
2015-01-01Full publication date if available
- Authors
-
Yu Jin, Heng He, Chuan Tian, Yadan Wang, Wei XiaList of authors in order
- Landing page
-
https://doi.org/10.5220/0006029605100515Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5220/0006029605100515Direct OA link when available
- Concepts
-
Cloud computing, Computer science, Access control, Mobile computing, Distributed computing, Computer security, Computer network, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3155468001 |
|---|---|
| doi | https://doi.org/10.5220/0006029605100515 |
| ids.doi | https://doi.org/10.5220/0006029605100515 |
| ids.mag | 3155468001 |
| ids.openalex | https://openalex.org/W3155468001 |
| fwci | 0.0 |
| type | article |
| title | Achieving Lightweight and Fine-grained Access Control in Mobile Cloud Computing |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 515 |
| biblio.first_page | 510 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9919000267982483 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T11614 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9861000180244446 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Cloud Data Security Solutions |
| topics[2].id | https://openalex.org/T10927 |
| topics[2].field.id | https://openalex.org/fields/33 |
| topics[2].field.display_name | Social Sciences |
| topics[2].score | 0.979200005531311 |
| topics[2].domain.id | https://openalex.org/domains/2 |
| topics[2].domain.display_name | Social Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/3312 |
| topics[2].subfield.display_name | Sociology and Political Science |
| topics[2].display_name | Access Control and Trust |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7369533777236938 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7260196208953857 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C527821871 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5132825374603271 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q228502 |
| concepts[2].display_name | Access control |
| concepts[3].id | https://openalex.org/C144543869 |
| concepts[3].level | 2 |
| concepts[3].score | 0.432179719209671 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2738570 |
| concepts[3].display_name | Mobile computing |
| concepts[4].id | https://openalex.org/C120314980 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4050251245498657 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[4].display_name | Distributed computing |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.277172714471817 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C31258907 |
| concepts[6].level | 1 |
| concepts[6].score | 0.2562786340713501 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[6].display_name | Computer network |
| concepts[7].id | https://openalex.org/C111919701 |
| concepts[7].level | 1 |
| concepts[7].score | 0.23855295777320862 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[7].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.7369533777236938 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7260196208953857 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/access-control |
| keywords[2].score | 0.5132825374603271 |
| keywords[2].display_name | Access control |
| keywords[3].id | https://openalex.org/keywords/mobile-computing |
| keywords[3].score | 0.432179719209671 |
| keywords[3].display_name | Mobile computing |
| keywords[4].id | https://openalex.org/keywords/distributed-computing |
| keywords[4].score | 0.4050251245498657 |
| keywords[4].display_name | Distributed computing |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.277172714471817 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/computer-network |
| keywords[6].score | 0.2562786340713501 |
| keywords[6].display_name | Computer network |
| keywords[7].id | https://openalex.org/keywords/operating-system |
| keywords[7].score | 0.23855295777320862 |
| keywords[7].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.5220/0006029605100515 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306524098 |
| locations[0].source.issn | |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Proceedings of the Information Science and Management Engineering III |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the Information Science and Management Engineering III |
| locations[0].landing_page_url | https://doi.org/10.5220/0006029605100515 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101683942 |
| authorships[0].author.orcid | https://orcid.org/0009-0005-1248-0798 |
| authorships[0].author.display_name | Yu Jin |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[0].affiliations[0].raw_affiliation_string | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[0].institutions[0].id | https://openalex.org/I43922553 |
| authorships[0].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Yu Jin |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[1].author.id | https://openalex.org/A5101534722 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-0041-2369 |
| authorships[1].author.display_name | Heng He |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[1].affiliations[0].raw_affiliation_string | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[1].institutions[0].id | https://openalex.org/I43922553 |
| authorships[1].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Heng He |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[2].author.id | https://openalex.org/A5102221538 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Chuan Tian |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[2].affiliations[0].raw_affiliation_string | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[2].institutions[0].id | https://openalex.org/I43922553 |
| authorships[2].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Chuan Tian |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[3].author.id | https://openalex.org/A5101973265 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-5436-3294 |
| authorships[3].author.display_name | Yadan Wang |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[3].affiliations[0].raw_affiliation_string | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[3].institutions[0].id | https://openalex.org/I43922553 |
| authorships[3].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Yadan Wang |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[4].author.id | https://openalex.org/A5053624960 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-8491-6064 |
| authorships[4].author.display_name | Wei Xia |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[4].affiliations[0].raw_affiliation_string | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[4].institutions[0].id | https://openalex.org/I43922553 |
| authorships[4].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Wei Xia |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5220/0006029605100515 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Achieving Lightweight and Fine-grained Access Control in Mobile Cloud Computing |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9919000267982483 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2748952813, https://openalex.org/W4244478748, https://openalex.org/W4223488648, https://openalex.org/W2134969820, https://openalex.org/W2251605416, https://openalex.org/W2560439919, https://openalex.org/W4389340727, https://openalex.org/W3150465815, https://openalex.org/W2074254449 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5220/0006029605100515 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306524098 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Proceedings of the Information Science and Management Engineering III |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the Information Science and Management Engineering III |
| best_oa_location.landing_page_url | https://doi.org/10.5220/0006029605100515 |
| primary_location.id | doi:10.5220/0006029605100515 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306524098 |
| primary_location.source.issn | |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Proceedings of the Information Science and Management Engineering III |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the Information Science and Management Engineering III |
| primary_location.landing_page_url | https://doi.org/10.5220/0006029605100515 |
| publication_date | 2015-01-01 |
| publication_year | 2015 |
| referenced_works_count | 0 |
| abstract_inverted_index | |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.23470362 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |