共 50 条
- [41] Enforcing trust in pervasive computing with trusted computing technology [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
- [42] Middleware for pervasive computing: A survey [J]. PERVASIVE AND MOBILE COMPUTING, 2013, 9 (02) : 177 - 200
- [43] A Survey of Proactive Pervasive Computing [J]. PROCEEDINGS OF THE 2014 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP'14 ADJUNCT), 2014, : 421 - 430
- [44] Trust maintenance toward virtual computing environment in the Grid service [J]. PROGRESS IN WWW RESEARCH AND DEVELOPMENT, PROCEEDINGS, 2008, 4976 : 166 - +
- [45] A SURVEY OF PERVASIVE COMPUTING PROJECTS [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
- [46] SLA Based Trust Model with Load Balancing for a Pervasive Environment [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2013, : 181 - 185
- [47] Service Discovery Protocols in Pervasive Computing: A review [J]. 17TH IEEE INTERNATIONAL MULTI TOPIC CONFERENCE 2014, 2014, : 205 - 210
- [49] A Trust-Based Access Control Model for Pervasive Computing Applications [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314