Security policies and trust in ubiquitous computing
From MaRDI portal
Publication:5504044
Recommendations
Cited in
(12)- scientific article; zbMATH DE number 1962737 (Why is no real title available?)
- Trust based pervasive computing
- USB packets filtering policies and an associated low-cost simulation framework
- scientific article; zbMATH DE number 1947760 (Why is no real title available?)
- Ubiquitous integrity via network integration and parallelism-sustaining pedestrian/bike urbanism
- A study on secure contents using in urban computing
- scientific article; zbMATH DE number 2089737 (Why is no real title available?)
- Security, privacy and trust in modern data management.
- Trust management framework for ubiquitous applications
- Distributed Computing - IWDC 2003
- scientific article; zbMATH DE number 1844588 (Why is no real title available?)
- Group preference modeling for intelligent shared environments: social welfare beyond the sum
This page was built for publication: Security policies and trust in ubiquitous computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5504044)