-
1
-
-
33847058446
-
-
Judd, G., Steenkiste, P.: Providing Contextual Information to Pervasive Computing Applications. In: PerCom 2003, pp. 133-142 (2003)
-
Judd, G., Steenkiste, P.: Providing Contextual Information to Pervasive Computing Applications. In: PerCom 2003, pp. 133-142 (2003)
-
-
-
-
2
-
-
2942623979
-
-
Mostéfaoui, G.K., Brézillon, P.: Modeling Context-Based Security Policies with Contextual Graphs. In: PerCom 2004, pp. 28-32 (2004)
-
Mostéfaoui, G.K., Brézillon, P.: Modeling Context-Based Security Policies with Contextual Graphs. In: PerCom 2004, pp. 28-32 (2004)
-
-
-
-
4
-
-
24644520728
-
-
Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, 2609, pp. 1-15. Springer, Heidelberg (2003)
-
Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1-15. Springer, Heidelberg (2003)
-
-
-
-
5
-
-
17144408406
-
Balancing Security Against Performance in Wireless Ad Hoc' and Sensor Networks
-
Chigan, C., Ye, Y., Li, L.: Balancing Security Against Performance in Wireless Ad Hoc' and Sensor Networks. In: VTC 2004, vol. 7, pp. 4735-4739 (2004)
-
(2004)
VTC
, vol.7
, pp. 4735-4739
-
-
Chigan, C.1
Ye, Y.2
Li, L.3
-
6
-
-
33646812912
-
-
Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B., Campbell, R., Bailey, B.: Towards a Pervasive Computing Benchmark. In: PerCom 2005, pp. 194-198 (2005)
-
Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B., Campbell, R., Bailey, B.: Towards a Pervasive Computing Benchmark. In: PerCom 2005, pp. 194-198 (2005)
-
-
-
-
7
-
-
57049099196
-
-
Bohn, J., Gärtner, F.: H.Vogt: Dependability Issues in Pervasive Computing in a Healthcare Environment. In: SPC 2003, pp. 53 70 (2003)
-
Bohn, J., Gärtner, F.: H.Vogt: Dependability Issues in Pervasive Computing in a Healthcare Environment. In:" SPC 2003, pp. 53 70 (2003)
-
-
-
-
8
-
-
34948868157
-
Pervasive Computing in Health Care: Smart Spaces and Enterprise Information Systems
-
Black, J.P., Segmuller, W., Cohen, N., Leiba, B., Misra, A., Ebling, M.R., Stern, E.: Pervasive Computing in Health Care: Smart Spaces and Enterprise Information Systems. In: MobiSys 2004 Workshop on Context Awareness (2004)
-
(2004)
MobiSys 2004 Workshop on Context Awareness
-
-
Black, J.P.1
Segmuller, W.2
Cohen, N.3
Leiba, B.4
Misra, A.5
Ebling, M.R.6
Stern, E.7
-
9
-
-
35549000167
-
-
Sanchez, C., Gruenwald, L., Sanchez, M.: A Monte Carlo Framework to Evaluate Context Based Security Policies in Pervasive Mobile Environments. In: MobiDE 2007, pp. 41-48 (2007)
-
Sanchez, C., Gruenwald, L., Sanchez, M.: A Monte Carlo Framework to Evaluate Context Based Security Policies in Pervasive Mobile Environments. In: MobiDE 2007, pp. 41-48 (2007)
-
-
-
-
10
-
-
0036036577
-
Security Attribute Evaluation Method: A Cost-benefit Approach
-
Butler, S.A.: Security Attribute Evaluation Method: A Cost-benefit Approach. In: ICSE 2002, pp. 232-240 (2002)
-
(2002)
ICSE 2002
, pp. 232-240
-
-
Butler, S.A.1
-
11
-
-
0005330416
-
Multi-attribute Risk Assessment
-
Butler, S.A., Fischbeck, P.: Multi-attribute Risk Assessment. In: SREIS 2002 (2002)
-
(2002)
SREIS
-
-
Butler, S.A.1
Fischbeck, P.2
-
12
-
-
0036530772
-
A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II
-
Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation 6(2), 182-197 (2002)
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.2
, pp. 182-197
-
-
Deb, K.1
Pratap, A.2
Agarwal, S.3
Meyarivan, T.4
|