共 50 条
- [1] Trust-based service evaluation and selection model in pervasive computing environment [J]. Ruan Jian Xue Bao, 2006, SUPPL. (200-210):
- [2] A trust-based service evaluation and selection model in pervasive computing environment [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 641 - +
- [3] Trust-based dynamic authorization model for pervasive computing [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (08): : 70 - 73
- [4] A Trust-Based Access Control Model for Pervasive Computing Applications [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
- [5] Trust-based security in pervasive computing environments [J]. COMPUTER, 2001, 34 (12) : 154 - 157
- [6] A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 590 - +
- [7] A Secure Infrastructure for Service Discovery and Access in Pervasive Computing [J]. Mobile Networks and Applications, 2003, 8 : 113 - 125
- [8] A secure infrastructure for service discovery and access in pervasive computing [J]. MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02): : 113 - 125
- [10] A Secure Framework to Support Service Discovery in Pervasive Computing [J]. CREATING GLOBAL ECONOMIES THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: THEORY & PRACTICE, VOLS 1-3, 2009, : 1368 - 1373