|
Volumn 2006, Issue , 2006, Pages 253-257
|
Criticality aware access control model for pervasive applications
a a a |
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTATIONAL METHODS;
INFORMATION RETRIEVAL;
ACCESS CONTROL;
CRITICALITY AWARE ACCESS CONTROL;
FOR PERVASIVE APPLICATIONS;
SYSTEM RESOURCES;
SECURITY OF DATA;
|
EID: 33750321755
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/PERCOM.2006.19 Document Type: Conference Paper |
Times cited : (54)
|
References (5)
|