Controlling Data Dissemination
暂无分享,去创建一个
[1] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[2] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[3] Tharam S. Dillon,et al. On the Move to Meaningful Internet Systems, OTM 2010 , 2010, Lecture Notes in Computer Science.
[4] Janusz Górski,et al. Context Sensitive Privacy Management in a Distributed Environment , 2010, OTM Conferences.
[5] Abdelilah Essiari,et al. PKI-based security for peer-to-peer information sharing , 2004 .
[6] Laurent Bussard,et al. A Practical Generic Privacy Language , 2010, ICISS.
[7] Sabrina De Capitani di Vimercati,et al. A privacy-aware access control system , 2008, J. Comput. Secur..
[8] Meng Li,et al. Stream Operators for Querying Data Streams , 2005, WAIM.
[9] Fei Xing,et al. Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[10] Fillia Makedon,et al. Collaborative automated trust negotiation in peer-to-peer systems , 2004 .
[11] Sabrina De Capitani di Vimercati,et al. Guest Editorial: Special Issue on Computer and Communications Security , 2008, TSEC.
[12] Beng Chin Ooi,et al. Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques , 2003, WAIM.
[13] Kenneth G. Paterson,et al. Trusted computing: providing security for peer-to-peer networks , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[14] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[15] Helge Janicke,et al. A Property Based Framework for Trust and Reputation in Mobile Computing , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.