共 50 条
- [41] Pervasive Computing Secure Application Models Based on Trust Algorithm PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 606 - 609
- [42] An Adaptive Framework for Trust based Security in Pervasive Computing Environment 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 624 - 628
- [43] An Artificial Intelligence-based Trust Model for Pervasive Computing 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 701 - 706
- [44] Agent-based automated trust negotiation for pervasive computing ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 300 - 307
- [45] A novel cloud-based trust model for pervasive computing FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 693 - 700
- [46] A system architecture for pervasive computing ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 772 - +
- [47] Context-Aware Role-based Access Control in Pervasive Computing Systems SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
- [49] Exploiting hierarchical identity-based encryption for access control to pervasive computing information FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 384 - 393
- [50] Trust Service Selection in Pervasive Computing MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 173 - 176