{"_id":"FNfcmsnQQATSK4LAm","bibbaseid":"alzahrani-fotiou-albeshri-almuhaimeed-alsubhi-distributedaccesscontrolforinformationcentricnetworkingarchitecturesusingverifiablecredentials-2023","author_short":["Alzahrani, B.","Fotiou, N.","Albeshri, A.","Almuhaimeed, A.","Alsubhi, K."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Bander"],"propositions":[],"lastnames":["Alzahrani"],"suffixes":[]},{"firstnames":["Nikos"],"propositions":[],"lastnames":["Fotiou"],"suffixes":[]},{"firstnames":["Aiiad"],"propositions":[],"lastnames":["Albeshri"],"suffixes":[]},{"firstnames":["Abdullah"],"propositions":[],"lastnames":["Almuhaimeed"],"suffixes":[]},{"firstnames":["Khalid"],"propositions":[],"lastnames":["Alsubhi"],"suffixes":[]}],"title":"Distributed access control for information-centric networking architectures using verifiable credentials","journal":"International Journal of Information Security","volume":"22","number":"2","pages":"467–478","month":"April","year":"2023","coden":"????","doi":"https://doi.org/10.1007/s10207-022-00649-9","issn":"1615-5262 (print), 1615-5270 (electronic)","issn-l":"1615-5262","bibdate":"Fri Mar 17 09:48:23 MDT 2023","bibsource":"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib","url":"https://link.springer.com/article/10.1007/s10207-022-00649-9","acknowledgement":"Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \\path|beebe@math.utah.edu|, \\path|beebe@acm.org|, \\path|beebe@computer.org| (Internet), URL: \\path|https://www.math.utah.edu/ beebe/|","ajournal":"Int. J. Info. Sci.","fjournal":"International Journal of Information Security","journal-url":"https://link.springer.com/journal/10207","bibtex":"@Article{Alzahrani:2023:DAC,\n author = \"Bander Alzahrani and Nikos Fotiou and Aiiad Albeshri\n and Abdullah Almuhaimeed and Khalid Alsubhi\",\n title = \"Distributed access control for information-centric\n networking architectures using verifiable credentials\",\n journal = j-INT-J-INFO-SEC,\n volume = \"22\",\n number = \"2\",\n pages = \"467--478\",\n month = apr,\n year = \"2023\",\n CODEN = \"????\",\n DOI = \"https://doi.org/10.1007/s10207-022-00649-9\",\n ISSN = \"1615-5262 (print), 1615-5270 (electronic)\",\n ISSN-L = \"1615-5262\",\n bibdate = \"Fri Mar 17 09:48:23 MDT 2023\",\n bibsource = \"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib\",\n URL = \"https://link.springer.com/article/10.1007/s10207-022-00649-9\",\n acknowledgement = ack-nhfb,\n ajournal = \"Int. J. Info. Sci.\",\n fjournal = \"International Journal of Information Security\",\n journal-URL = \"https://link.springer.com/journal/10207\",\n}\n\n","author_short":["Alzahrani, B.","Fotiou, N.","Albeshri, A.","Almuhaimeed, A.","Alsubhi, K."],"key":"Alzahrani:2023:DAC","id":"Alzahrani:2023:DAC","bibbaseid":"alzahrani-fotiou-albeshri-almuhaimeed-alsubhi-distributedaccesscontrolforinformationcentricnetworkingarchitecturesusingverifiablecredentials-2023","role":"author","urls":{"Paper":"https://link.springer.com/article/10.1007/s10207-022-00649-9"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"ftp.math.utah.edu/pub/tex/bib/intjinfosec.bib","dataSources":["fEXH7XH8oyBtpzKFi"],"keywords":[],"search_terms":["distributed","access","control","information","centric","networking","architectures","using","verifiable","credentials","alzahrani","fotiou","albeshri","almuhaimeed","alsubhi"],"title":"Distributed access control for information-centric networking architectures using verifiable credentials","year":2023}