Security, Privacy and Trust Issues in Smart Environments
暂无分享,去创建一个
Sotirios Terzis | W. Wagealla | C. English | Patrick Nixon | P. Nixon | S. Terzis | W. Wagealla | C. English
[1] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[2] Roy H. Campbell,et al. Towards Security and Privacy for Pervasive Computing , 2002, ISSS.
[3] Ninghui Li,et al. RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[4] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[5] Ghita Kouadri Mostéfaoui. Security in Pervasive Environments, What's Next? , 2003, Security and Management.
[6] Germano Caronni,et al. Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[7] Paddy Nixon,et al. The SECURE collaboration model , 2003 .
[8] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[9] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[10] Gerard Lacey,et al. Managing Smart Environments , 2000 .
[11] Boon Thau Loo,et al. Trust Management , 2006, Lecture Notes in Computer Science.
[12] Morris Sloman,et al. Trust Management Tools for Internet Applications , 2003, iTrust.
[13] Sotirios Terzis,et al. Trust-based model for privacy control in context aware systems , 2003 .
[14] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.
[15] Marianne Winslett,et al. Requirements for policy languages for trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[16] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[17] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[18] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[19] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[20] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[21] Catholijn M. Jonker,et al. Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.
[22] Alice Bob,et al. The PGP Trust Model , 2005 .
[23] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[24] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[25] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[26] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[27] J. Rubenfeld. The Right of Privacy , 1989 .
[28] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[29] Herman T. Tavani,et al. Informational privacy, data mining, and the Internet , 1998, Ethics and Information Technology.
[30] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[31] Fred D. Davis,et al. TRUST FORMATION IN NEW ORGANIZATIONAL RELATIONSHIPS , 1996 .
[32] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[33] Philip Robinson,et al. Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments , 2003, SPC.
[34] Tim Finin,et al. A Security Architecture Based on Trust Management for Pervasive Computing Systems , 2002 .
[35] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[36] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[37] Anup K. Ghosh,et al. Software security and privacy risks in mobile e-commerce , 2001, CACM.
[38] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[39] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[40] Gerard Lacey,et al. Managing Interactions in Smart Environments , 2000, Springer London.