Security policies and trust in ubiquitous computing
From MaRDI portal
Publication:5504044
DOI10.1098/RSTA.2008.0142zbMATH Open1153.94456OpenAlexW2131601726WikidataQ37232457 ScholiaQ37232457MaRDI QIDQ5504044FDOQ5504044
Authors: Anupam Joshi, Lalana Kagal, Jim Parker, Anand Patwardhan, Timothy W. Finin
Publication date: 21 January 2009
Published in: Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1098/rsta.2008.0142
Recommendations
Cited In (12)
- Trust based pervasive computing
- USB packets filtering policies and an associated low-cost simulation framework
- Title not available (Why is that?)
- Ubiquitous integrity via network integration and parallelism-sustaining pedestrian/bike urbanism
- A study on secure contents using in urban computing
- Title not available (Why is that?)
- Security, privacy and trust in modern data management.
- Distributed Computing - IWDC 2003
- Trust management framework for ubiquitous applications
- Title not available (Why is that?)
- Group preference modeling for intelligent shared environments: social welfare beyond the sum
- Title not available (Why is that?)
This page was built for publication: Security policies and trust in ubiquitous computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5504044)