Author:
Iltaf Naima,Ghafoor Abdul,Zia Usman,Hussain Mukhtar
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference26 articles.
1. Wagealla, W., Carbone, M., English, C., Terzis, S., & Nixon, P. (Sept. 2003). A formal model on trust lifecycle management. In Workshop on formal aspects of security and trust, Italy, pp. 184–195.
2. Shand, B., Dimmock, N., & Bacon, J. (2003). Trust for ubiquitous, transparent collaboration. In 1st IEEE International Conference on Pervasive Computing and Communications, pp. 1–6, MA, USA, March 23–25.
3. Iltaf, N., Mahmud, U., & Kamran, F. (2006). Security & enforcement in pervasive computing environment (STEP). In 2006 international symposium on high-capacity optical networks and enabling technologies, USA, pp. 1–5, September 6–8.
4. Deno, M. K., & Sun, T. (2008). Probabilistic trust management in pervasive computing. In IEEE/IFIP international conference on embedded and ubiquitous computing, Guelph, ON, pp. 610–615, December 17–20.
5. Komarova, M., & Riguidel, M. (2008). Adjustable trust model for access control. In 5th international conference on autonomic and trusted computing. Oslo, Norway, pp. 429–443, June 23–25.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献