共 50 条
[31]
An effective method for location privacy in ubiquitous computing
[J].
EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS,
2005, 3823
:1006-1015
[34]
Method for Privacy Requirements Elicitation in Ubiquitous Computing
[J].
SBES'18: PROCEEDINGS OF THE XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING,
2018,
:178-183
[35]
Ubiquitous privacy-preserving identity managment
[J].
PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE,
2008,
:589-603
[37]
A Virtualised High Trust Zone (VHTZ) to Mitigate the Security and Privacy Issues in Cloud Computing
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2012, 12 (12)
:6-14
[38]
Next Generation Cloud Computing: Security, Privacy and Trust Issues from the System View
[J].
2021 18TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE-2021),
2021,