{"id":25477,"date":"2023-07-26T01:30:54","date_gmt":"2023-07-26T01:30:54","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=25477"},"modified":"2026-04-17T18:07:40","modified_gmt":"2026-04-17T18:07:40","slug":"innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/","title":{"rendered":"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<p>NSFOCUS Security Labs recently collaborated with the research team from the School of Computer Science at China University of Geosciences (Wuhan) on a research paper titled &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/10159673\" target=\"_blank\" rel=\"noreferrer noopener\">Computable Access Control: Embedding Access Control Rules into Euclidean Space<\/a>&#8220;. This paper has been officially accepted and published online by the prestigious international journal &#8220;IEEE Transactions on Systems, Man, and Cybernetics: Systems&#8221; (IEEE SMCS).<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/NSFOCUS-security-research-achievement.jpg\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/NSFOCUS-security-research-achievement-1024x468.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25479\" width=\"748\" height=\"341\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/NSFOCUS-security-research-achievement-1024x468.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/NSFOCUS-security-research-achievement-300x137.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/NSFOCUS-security-research-achievement-768x351.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/NSFOCUS-security-research-achievement-600x274.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/NSFOCUS-security-research-achievement-200x91.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/NSFOCUS-security-research-achievement.jpg 1033w\" sizes=\"(max-width: 748px) 100vw, 748px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>As an academic publication, IEEE SMCS features peer-reviewed articles, research papers, case studies, and reviews contributed by researchers, scientists, and practitioners from around the world. It serves as a valuable resource for professionals in the field of systems engineering and cybernetics, facilitating the exchange of knowledge and the dissemination of cutting-edge research. IEEE SMCS is a top journal in the field of artificial intelligence, with a current impact factor of 11.471.<\/p>\n\n\n\n<p>The research in this paper addresses the technical bottlenecks in network security control by exploring knowledge-embedded security control methods. Access control is a fundamental theory and technology for securing cyberspace. In traditional network environments, security components such as firewalls and intrusion prevention systems enforce access control based on pre-established security policies and rules to protect the network. However, in the era of big data, cyberspace is highly open, and relying solely on static security techniques makes it difficult to effectively defend against a constant stream of malicious code and attack traffic. To tackle this issue, the paper draws inspiration from the concept of knowledge embedding in artificial intelligence. It treats existing security rules, log information, malicious code features, etc., as &#8220;prior security knowledge&#8221; of computers, representing them as vectors in Euclidean space. By employing vector-based computations, the paper achieves inference and prediction of security knowledge. This endows computers with the ability to &#8220;understand security knowledge and use existing knowledge to anticipate the network security environment,&#8221; thus assisting in the realization of intelligent network security access control.<\/p>\n\n\n\n<p>This collaborative work is supported by the NSFOCUS CCF-Kunpeng Fund. It is likely to be applied in current booming technologies like zero-trust network security technology and APT attack prevention and contribute to the construction of the world network security ecosystem.<\/p>\n\n\n\n<p><strong>Information of the Research Paper<\/strong><\/p>\n\n\n\n<p>Title: Computable Access Control: Embedding Access Control Rules into Euclidean Space<\/p>\n\n\n\n<p>DOI:&nbsp;10.1109\/TSMC.2023.3283527<\/p>\n\n\n\n<p>Link: https:\/\/ieeexplore.ieee.org\/document\/10159673<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>NSFOCUS Security Labs recently collaborated with the research team from the School of Computer Science at China University of Geosciences (Wuhan) on a research paper titled &#8220;Computable Access Control: Embedding Access Control Rules into Euclidean Space&#8220;. This paper has been officially accepted and published online by the prestigious international journal &#8220;IEEE Transactions on Systems, Man, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[560],"class_list":["post-25477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-nsfocus-security-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems - NSFOCUS<\/title>\n<meta name=\"description\" content=\"A joint research paper between NSFOCUS and China University of Geosciences (Wuhan) titled &quot;Computable Access Control: Embedding Access Control Rules into Euclidean Space.&quot; has been officially accepted and published online by the prestigious international journal &quot;IEEE Transactions on Systems, Man, and Cybernetics: Systems&quot; (TSMCA).\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"A joint research paper between NSFOCUS and China University of Geosciences (Wuhan) titled &quot;Computable Access Control: Embedding Access Control Rules into Euclidean Space.&quot; has been officially accepted and published online by the prestigious international journal &quot;IEEE Transactions on Systems, Man, and Cybernetics: Systems&quot; (TSMCA).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-26T01:30:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/IEEE-SMCS.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"A joint research paper between NSFOCUS and China University of Geosciences (Wuhan) titled &quot;Computable Access Control: Embedding Access Control Rules into Euclidean Space.&quot; has been officially accepted and published online by the prestigious international journal &quot;IEEE Transactions on Systems, Man, and Cybernetics: Systems&quot; (TSMCA).\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/IEEE-SMCS.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems\",\"datePublished\":\"2023-07-26T01:30:54+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/\"},\"wordCount\":385,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/IEEE-SMCS.jpg\",\"keywords\":[\"NSFOCUS Security Labs;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/\",\"name\":\"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/IEEE-SMCS.jpg\",\"datePublished\":\"2023-07-26T01:30:54+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"description\":\"A joint research paper between NSFOCUS and China University of Geosciences (Wuhan) titled \\\"Computable Access Control: Embedding Access Control Rules into Euclidean Space.\\\" has been officially accepted and published online by the prestigious international journal \\\"IEEE Transactions on Systems, Man, and Cybernetics: Systems\\\" (TSMCA).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/IEEE-SMCS.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/IEEE-SMCS.jpg\",\"width\":2560,\"height\":769,\"caption\":\"IEEE SMC logo with text.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems - NSFOCUS","description":"A joint research paper between NSFOCUS and China University of Geosciences (Wuhan) titled \"Computable Access Control: Embedding Access Control Rules into Euclidean Space.\" has been officially accepted and published online by the prestigious international journal \"IEEE Transactions on Systems, Man, and Cybernetics: Systems\" (TSMCA).","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems - NSFOCUS","og_description":"A joint research paper between NSFOCUS and China University of Geosciences (Wuhan) titled &quot;Computable Access Control: Embedding Access Control Rules into Euclidean Space.&quot; has been officially accepted and published online by the prestigious international journal &quot;IEEE Transactions on Systems, Man, and Cybernetics: Systems&quot; (TSMCA).","og_url":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/","og_site_name":"NSFOCUS","article_published_time":"2023-07-26T01:30:54+00:00","article_modified_time":"2026-04-17T18:07:40+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/IEEE-SMCS.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems - NSFOCUS","twitter_description":"A joint research paper between NSFOCUS and China University of Geosciences (Wuhan) titled &quot;Computable Access Control: Embedding Access Control Rules into Euclidean Space.&quot; has been officially accepted and published online by the prestigious international journal &quot;IEEE Transactions on Systems, Man, and Cybernetics: Systems&quot; (TSMCA).","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/IEEE-SMCS.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems","datePublished":"2023-07-26T01:30:54+00:00","dateModified":"2026-04-17T18:07:40+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/"},"wordCount":385,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/IEEE-SMCS.jpg","keywords":["NSFOCUS Security Labs;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/","url":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/","name":"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/IEEE-SMCS.jpg","datePublished":"2023-07-26T01:30:54+00:00","dateModified":"2026-04-17T18:07:40+00:00","description":"A joint research paper between NSFOCUS and China University of Geosciences (Wuhan) titled \"Computable Access Control: Embedding Access Control Rules into Euclidean Space.\" has been officially accepted and published online by the prestigious international journal \"IEEE Transactions on Systems, Man, and Cybernetics: Systems\" (TSMCA).","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/IEEE-SMCS.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/IEEE-SMCS.jpg","width":2560,"height":769,"caption":"IEEE SMC logo with text."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/innovative-access-control-approach-published-in-ieee-transactions-on-systems-man-and-cybernetics-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Innovative Access Control Approach Published in IEEE Transactions on Systems, Man, and Cybernetics: Systems"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=25477"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25477\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/25486"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=25477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=25477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=25477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}