Trustworthy pervasive computing: the hard security problems
暂无分享,去创建一个
[1] Trinny Woodall,et al. What Your Clothes Say About You , 2005 .
[2] Roy H. Campbell,et al. A flexible, privacy-preserving authentication framework for ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[3] 坂倉 省吾,et al. Technology Review : 抄録雑誌の概要 , 1987 .
[4] Herbert Burkert,et al. Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .
[5] Jaehong Park,et al. Towards usage control models: beyond traditional access control , 2002, SACMAT '02.
[6] G. DeFriese,et al. The New York Times , 2020, Publishing for Libraries.
[7] Yong Chen,et al. End-to-End Trust Starts with Recognition , 2003, SPC.
[8] John A. Clark,et al. Proceedings of the Third international conference on Security in Pervasive Computing , 2006 .
[9] Alfred Kobsa,et al. Privacy through pseudonymity in user-adaptive systems , 2003, TOIT.
[10] Sadie Creese,et al. Authentication for Pervasive Computing , 2003, SPC.
[11] L. Belitsky. Protecting the privacy of patients' health information. , 2003, The Alabama nurse.
[12] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[13] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[14] Robert D. McFadden,et al. No hiding place , 1981 .
[15] Vincent M. Stanford,et al. Pervasive Health Care Applications Face Tough Security Challenges , 2002, IEEE Pervasive Comput..
[16] Jerrold A. Neiminen. To Print Or Not To Print. , 1969 .
[17] Jean Bacon,et al. Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[18] Santosh Chokhani. Trusted products evaluation , 1992, CACM.
[19] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[20] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[21] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..