共 50 条
[21]
Security policies and trust in ubiquitous computing
[J].
PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES,
2008, 366 (1881)
:3769-3780
[22]
Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing
[J].
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES,
2014, 131
:316-329
[23]
An identity privacy enhanced trust model in fully distributed virtual computing environments
[J].
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS,
2009,
:704-+
[24]
Privacy Context Model for Dynamic Privacy Adaptation in Ubiquitous Computing
[J].
UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING,
2012,
:752-757
[25]
Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environinent
[J].
2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7,
2004,
:5627-5632
[26]
Software design issues for ubiquitous computing
[J].
IEEE COMPUTER SOCIETY WORKSHOP ON VLSI '98 - SYSTEM LEVEL DESIGN, PROCEEDINGS,
1998,
:104-109
[27]
Software engineering issues for ubiquitous computing
[J].
Proceedings - International Conference on Software Engineering,
1999,
:75-84
[28]
Smart Privacy Management in Ubiquitous Computing Environments
[J].
HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II,
2009, 5618
:131-139
[30]
In Search of User Privacy Protection in Ubiquitous Computing
[J].
2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI),
2012,
:694-699