Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments
暂无分享,去创建一个
[1] Hiroshi Yasuda,et al. Practical Anonymous Access Control Protocols for Ubiquitous Computing , 2006, J. Comput..
[2] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[3] Lionel Brunie,et al. Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments , 2007, GPC.
[4] Young-Koo Lee,et al. A Trust-Based Security Architecture for Ubiquitous Computing Systems , 2006, ISI.
[5] Sheikh Iqbal Ahamed,et al. Service sharing with trust in pervasive environment: now it's time to break the jinx , 2008, SAC '08.
[6] Marek Kľoc CCIE. Identity-based Access Control , 2009, Encyclopedia of Database Systems.
[7] Alexander Aiken,et al. Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.
[8] Lionel Brunie,et al. Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[9] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[10] Raph Levien,et al. Attack-Resistant Trust Metrics , 2009, Computing with Social Trust.