共 50 条
- [21] Security policies and trust in ubiquitous computing PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
- [22] An identity privacy enhanced trust model in fully distributed virtual computing environments NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 704 - +
- [23] Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 316 - 329
- [24] Privacy Context Model for Dynamic Privacy Adaptation in Ubiquitous Computing UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, 2012, : 752 - 757
- [25] Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environinent 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5627 - 5632
- [26] Smart Privacy Management in Ubiquitous Computing Environments HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II, 2009, 5618 : 131 - 139
- [27] Software design issues for ubiquitous computing IEEE COMPUTER SOCIETY WORKSHOP ON VLSI '98 - SYSTEM LEVEL DESIGN, PROCEEDINGS, 1998, : 104 - 109
- [28] Software engineering issues for ubiquitous computing Proceedings - International Conference on Software Engineering, 1999, : 75 - 84
- [30] In Search of User Privacy Protection in Ubiquitous Computing 2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 694 - 699