메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Towards shrink-wrapped security: A taxonomy of security-relevant context

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXT-AWARE; CONTEXT-AWARE SYSTEMS; CORPORATE RESOURCES; TIGHT COUPLING; UBIQUITOUS ACCESS;

EID: 70349306584     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOM.2009.4912819     Document Type: Conference Paper
Times cited : (10)

References (5)
  • 2
    • 0003429331 scopus 로고    scopus 로고
    • A survey of context-aware mobile computing research
    • Technical Report TR2000-381, Dept. of Computer Science, Dartmouth College, November
    • G. Chen and D. Kotz, "A survey of context-aware mobile computing research", Technical Report TR2000-381, Dept. of Computer Science, Dartmouth College, November 2000.
    • (2000)
    • Chen, G.1    Kotz, D.2
  • 3
    • 8344224059 scopus 로고    scopus 로고
    • Context information vs. sensor information: A model for categorizing context in context-aware mobile computing
    • L. Barkhuus, "Context information vs. sensor information: A model for categorizing context in context-aware mobile computing", Symposium on Collaborative Technologies and Systems, pp. 127-133,2003.
    • (2003) Symposium on Collaborative Technologies and Systems , pp. 127-133
    • Barkhuus, L.1
  • 4
    • 70349339830 scopus 로고    scopus 로고
    • Public printing and documents, Title 44 U.S. Code, Pts. 3542, 2003
    • "Public printing and documents", Title 44 U.S. Code, Pts. 3542, 2003
  • 5
    • 0030676601 scopus 로고    scopus 로고
    • How to systematically classify computer security intrusions
    • May
    • U. Lindqvist and E. Jonsson, "How to systematically classify computer security intrusions", IEEE Symposium on Security and Privacy, pp. 154-163, May 1997.
    • (1997) IEEE Symposium on Security and Privacy , pp. 154-163
    • Lindqvist, U.1    Jonsson, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.