共 50 条
- [2] Trust Service Selection in Pervasive Computing [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 173 - 176
- [3] A Trust-Based Access Control Model for Pervasive Computing Applications [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
- [4] Trust-based security in pervasive computing environments [J]. COMPUTER, 2001, 34 (12) : 154 - 157
- [5] Trust management and service selection in pervasive computing environments [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 620 - 623
- [7] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 669 - 672
- [8] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 617 - 620
- [10] Trust-based service composition and selection in service oriented architecture [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 862 - 880