메뉴 건너뛰기




Volumn , Issue , 2007, Pages 698-703

A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; PARAMETER ESTIMATION; UBIQUITOUS COMPUTING; USER INTERFACES;

EID: 37349002329     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MUE.2007.13     Document Type: Conference Paper
Times cited : (9)

References (15)
  • 1
    • 0001853125 scopus 로고
    • The Computer for the 21st Century
    • Sept, reprinted in IEEE Pervasive Computing, pp. 19-25, Jan.-Mar. 2002
    • M. Weiser, "The Computer for the 21st Century," Scientific America, pp. 94-104, Sept. 1991; reprinted in IEEE Pervasive Computing, pp. 19-25, Jan.-Mar. 2002.
    • (1991) Scientific America , pp. 94-104
    • Weiser, M.1
  • 2
    • 0035428427 scopus 로고    scopus 로고
    • Pervasive Computing: Vision and Challenges
    • Aug
    • M. Satyanarayanan, "Pervasive Computing: Vision and Challenges," IEEE Personal Communications, pp. 10-17, Aug. 2001.
    • (2001) IEEE Personal Communications , pp. 10-17
    • Satyanarayanan, M.1
  • 3
  • 4
    • 2942585235 scopus 로고    scopus 로고
    • Pervasive authentication domains for automatic pervasive device authorization
    • March
    • R. Sailer and J.R. Giles, "Pervasive authentication domains for automatic pervasive device authorization," in Proc. Second IEEE Annual Conference, pp. 144-148, 14-17 March 2004.
    • (2004) Proc. Second IEEE Annual Conference
    • Sailer, R.1    Giles, J.R.2
  • 5
    • 0038148412 scopus 로고    scopus 로고
    • A Unified Scheme for Resource Protecion in Automated Trust Negotiation
    • May
    • T. Yu and M. Winslett, "A Unified Scheme for Resource Protecion in Automated Trust Negotiation," in Proc. IEEE Symp. Security and Privacy, pp. 110-122, May 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 11
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • December
    • Lalana Kagal, Tim Finin, and Anupam Joshi, "Trust-based security in pervasive computing environments," IEEE Computer, 34(12):154-157, December 2001.
    • (2001) IEEE Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 14
    • 35048901065 scopus 로고    scopus 로고
    • H. Q. Ngo, A. Shehzad, K. A. Pham, M. Riaz, S. Liaquat and S. Y. Lee, Developing Context-aware Ubiquitous Computing Systems with a Unified Middleware Framework, Embedded and Ubiquitous Computing (EUC 2004), pp. 672-681, Aug. 2004.
    • H. Q. Ngo, A. Shehzad, K. A. Pham, M. Riaz, S. Liaquat and S. Y. Lee, "Developing Context-aware Ubiquitous Computing Systems with a Unified Middleware Framework," Embedded and Ubiquitous Computing (EUC 2004), pp. 672-681, Aug. 2004.
  • 15
    • 37349044727 scopus 로고    scopus 로고
    • Intrusion Tolerant Group-based Trust Management Scheme for Wireless Sensor
    • submitted for publication
    • Riaz Ahmed Shaikh et al., "Intrusion Tolerant Group-based Trust Management Scheme for Wireless Sensor Networks", submitted for publication.
    • Networks
    • Ahmed Shaikh, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.