Security in Pervasive Computing Calling for new Security Principles
暂无分享,去创建一个
[1] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[2] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[3] Adolf Hohl,et al. Safeguarding Personal Data using Rights Management in Distributed Applications , 2007, SEC.
[4] Christian Schaefer,et al. A Security-by-Contract Architecture for Pervasive Services , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[5] Christian Schaefer,et al. Monitors for Usage Control , 2007, IFIPTM.
[6] Carl M. Ellison,et al. The nature of a useable PKI , 1999, Comput. Networks.
[7] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .