메뉴 건너뛰기




Volumn 2609, Issue , 2003, Pages 1-15

Towards security and privacy for pervasive computing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PRIVACY; DIGITAL DEVICES; DISTRIBUTED COMPUTER SYSTEMS;

EID: 24644520728     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36532-x_1     Document Type: Article
Times cited : (59)

References (26)
  • 1
    • 79952747484 scopus 로고    scopus 로고
    • "Bluetooth." http://www.bluetooth.com/.
    • Bluetooth
  • 2
    • 35248877116 scopus 로고    scopus 로고
    • Reference number ISO/IEC 8802-11:1999(E) IEEE Std 802.11, 1999 edition. International Standard [for] Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications
    • "Reference number ISO/IEC 8802-11:1999(E) IEEE Std 802.11, 1999 edition. International Standard [for] Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications," IEEE, 1999.
    • (1999) IEEE
  • 3
    • 0142229016 scopus 로고    scopus 로고
    • Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
    • Atlanta, GA
    • M. Langheinrich, "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems," presented at ACM UbiComp 2001, Atlanta, GA, 2001.
    • (2001) ACM UbiComp 2001
    • Langheinrich, M.1
  • 6
    • 0035577649 scopus 로고    scopus 로고
    • Trust-Based Security in Pervasive Computing Environments
    • L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments," IEEE Computer, 2001.
    • (2001) IEEE Computer
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 8
    • 35248825518 scopus 로고    scopus 로고
    • Internet Draft, Feb. 24
    • J. Boyle and e. al, "The COPS Protocol." Internet Draft, Feb. 24, 1999.
    • (1999) The COPS Protocol
    • Boyle, J.1
  • 10
  • 12
    • 33646245389 scopus 로고    scopus 로고
    • Information Assurance and the Information Society
    • E. A. M. Luiijf, "Information Assurance and the Information Society," presented at EICAR Best Paper Proceedings, 1999.
    • (1999) EICAR Best Paper Proceedings
    • Luiijf, E.A.M.1
  • 16
    • 49349133217 scopus 로고
    • Fuzzy sets as basis for a theory of possibility
    • L. Zadeh, "Fuzzy sets as basis for a theory of possibility," Fuzzy Sets and Systems, vol. 1, pp. 3-28, 1978.
    • (1978) Fuzzy Sets and Systems , vol.1 , pp. 3-28
    • Zadeh, L.1
  • 18
    • 0028466968 scopus 로고
    • SESAME: The Solution to Security for Open Distributed Systems
    • P. Kaijser, T. Parker, and D. Pinkas, "SESAME: The Solution to Security for Open Distributed Systems," Computer Communications, vol. 17, pp. 501-518, 1994.
    • (1994) Computer Communications , vol.17 , pp. 501-518
    • Kaijser, P.1    Parker, T.2    Pinkas, D.3
  • 19
    • 0141641262 scopus 로고    scopus 로고
    • Reflective Middleware: From Your Desk to Your Hand
    • Reflective Middleware
    • M. Roman, F. Kon, and R. H. Campbell, "Reflective Middleware: From Your Desk to Your Hand," IEEE Distributed Systems Online Journal, Special Issue on Reflective Middleware, 2001.
    • (2001) IEEE Distributed Systems Online Journal , Issue.SPEC. ISSUE
    • Roman, M.1    Kon, F.2    Campbell, R.H.3
  • 23
    • 0242571322 scopus 로고    scopus 로고
    • Department of Computer Science, University of Illinois at Urbana-Champaign UIUCDCS-R-2002-2260
    • P. Naldurg and R. Campbell, "Dynamic Access Control Policies in Seraphim," Department of Computer Science, University of Illinois at Urbana-Champaign UIUCDCS-R-2002-2260, 2002.
    • (2002) Dynamic Access Control Policies in Seraphim
    • Naldurg, P.1    Campbell, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.