共 50 条
- [41] Privacy enhanced access control by SPKI [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, 2000, : 301 - 306
- [42] Coordination in pervasive computing environments [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
- [43] On Modeling for Pervasive Computing Environments [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
- [44] Privacy in pervasive computing and open issues [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 147 - +
- [46] Survey on location privacy in pervasive computing [J]. PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 23 - 34
- [47] Spatial Connector: Mapping Access Control Models for Pervasive Computing and Cloud Computing [J]. 14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 174 - 181
- [48] Towards security and privacy for pervasive computing [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 1 - 15
- [49] Pervasive Computing, Privacy and Distribution of the Self [J]. INFORMATION, 2011, 2 (02): : 360 - 371
- [50] Distributed Trust Based Access Control Architecture for Pervasive Computing [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 464 - 469