A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing
暂无分享,去创建一个
[1] Timothy W. Finin,et al. Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.
[2] Celeste Campo,et al. SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .
[3] T. Nixon,et al. Home networking with Universal Plug and Play , 2001 .
[4] Michael Nidd,et al. Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..
[5] Andrés Marín López,et al. Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[6] Frank Stajano,et al. The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.
[7] Mark Weiser. The computer for the 21st century , 1991 .
[8] Uwe Hansmann,et al. Pervasive Computing , 2003 .
[9] Hari Balakrishnan,et al. The design and implementation of an intentional naming system , 1999, SOSP.
[10] Mahadev Satyanarayanan,et al. Fundamental challenges in mobile computing , 1996, PODC '96.
[11] Matt W. Mutka,et al. Classification of Service Discovery in Pervasive Computing Environments , 2003 .
[12] Jin Nakazawa,et al. Improving security for ubiquitous campus applications , 2004, 2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops..
[13] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[14] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[15] Lionel M. Ni,et al. PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[16] R. Want,et al. System challenges for ubiquitous & pervasive computing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[17] Vinny Cahill,et al. A General Risk Assessment of Security in Pervasive Computing , 2003 .
[18] Philip Zimmermann,et al. PGP source code and internals , 1995 .
[19] Sheikh Iqbal Ahamed,et al. ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications , 2007, Int. J. Netw. Secur..
[20] Sheikh Iqbal Ahamed,et al. PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business , 2005, COMPSAC.
[21] Lionel M. Ni,et al. Expose or not? A progressive exposure approach for service discovery in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[22] Sheikh Iqbal Ahamed,et al. MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[23] Haifeng Li,et al. SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[24] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[25] Sheikh Iqbal Ahamed,et al. Knowledge Usability and its Characteristics for Pervasive Computing , 2005, PSC.
[26] Mark Weiser,et al. Some Computer Science Problems in Ubiquitous Computing , 1993 .
[27] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[28] Djamshid Tavangarian,et al. Security architecture for service-based mobile environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[29] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[30] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[31] Jianping Hu,et al. A novel cloud-based trust model for pervasive computing , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[32] Timothy W. Finin,et al. Moving from Security to Distributed Trust in Ubiquitous Computing Environments , 2001 .
[33] Armando Fox,et al. System Software for Ubiquitous Computing , 2022 .
[34] Philip Robinson,et al. Some Research Challenges in Pervasive Computing , 2005 .
[35] Lionel M. Ni,et al. Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[36] Sheikh Iqbal Ahamed,et al. SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[37] Sheikh Iqbal Ahamed,et al. An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[38] David R. Karger,et al. INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.