共 50 条
- [32] Ethical Considerations of High Performance Computing Access for Pervasive Computing DISTRIBUTED, AMBIENT AND PERVASIVE INTERACTIONS, DAPI 2023, PT I, 2023, 14036 : 311 - 327
- [33] Ontology access patterns for pervasive computing environments AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
- [34] Security Access Model in Pervasive Computing Environment Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965
- [35] An efficient key management scheme for pervasive computing ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 657 - 661
- [36] Smart wireless access points for pervasive computing WIRELESS ON-DEMAND NETWORK SYSTEMS, PROCEEDINGS, 2004, 2928 : 329 - 343
- [37] FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 310 - 319
- [38] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285