메뉴 건너뛰기




Volumn 22, Issue 3, 2004, Pages 95-105

Co-operation in the digital age - engendering trust in electronic environments

Author keywords

[No Author keywords available]

Indexed keywords

AUTONOMOUS AGENTS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FUZZY SETS; KNOWLEDGE ACQUISITION; MIDDLEWARE; MULTI AGENT SYSTEMS;

EID: 7644239527     PISSN: 13583948     EISSN: None     Source Type: Journal    
DOI: 10.1023/B:BTTJ.0000047124.46203.fc     Document Type: Article
Times cited : (6)

References (19)
  • 1
    • 0001853125 scopus 로고
    • The computer for the twenty-first century
    • Weiser M: 'The computer for the twenty-first century', Scientific American, 256, No 3, pp 94-104 (1991).
    • (1991) Scientific American , vol.256 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 2
    • 3042654543 scopus 로고    scopus 로고
    • PhD Transfer Report, Imperial College of Science, Technology and Medicine, Department of Computing
    • Grandison T: 'Trust specification and analysis for Internet application', PhD Transfer Report, Imperial College of Science, Technology and Medicine, Department of Computing (2001).
    • (2001) Trust Specification and Analysis for Internet Application
    • Grandison, T.1
  • 3
    • 7644226470 scopus 로고    scopus 로고
    • PhD theses, Imperial College of Science, Technology and Medicine, Department of Computing
    • Grandison T: 'Trust management for Internet applications', PhD theses, Imperial College of Science, Technology and Medicine, Department of Computing (2003).
    • (2003) Trust Management for Internet Applications
    • Grandison, T.1
  • 7
    • 0003839495 scopus 로고
    • PhD Department of Computer Science and Mathematics, University of Sterling
    • Marsh S: 'Formalising trust as a computational concept', PhD Department of Computer Science and Mathematics, University of Sterling (1994).
    • (1994) Formalising Trust As a Computational Concept
    • Marsh, S.1
  • 12
    • 7644232973 scopus 로고    scopus 로고
    • Security for whom? The shifting security assumptions of pervasive computing
    • Springer-Verlag
    • Stajano F: 'Security For Whom? The Shifting Security Assumptions of Pervasive Computing', Springer-Verlag, Proceedings of International Security Symposium (2002).
    • (2002) Proceedings of International Security Symposium
    • Stajano, F.1
  • 13
    • 29244440808 scopus 로고    scopus 로고
    • The butt of the iceberg: Hidden security problems of ubiquitous systems
    • Basten T, Geilen M and deGroot H (Eds), Kluwer Publishers
    • Stajano F and Crowcroft J: 'The butt of the iceberg: hidden security problems of ubiquitous systems', in Basten T, Geilen M and deGroot H (Eds): 'Ambient Intelligence: Impact on Embedded System Design', Kluwer Publishers (2003).
    • (2003) Ambient Intelligence: Impact on Embedded System Design
    • Stajano, F.1    Crowcroft, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.