Subject
General Computer Science,Theoretical Computer Science
Reference51 articles.
1. Al‐Muhtadi, J., Ranganathan, A., Campbell, R. and Mickunas, D. (2003), “Cerberus: a context‐aware security schema for smart spaces”,Proceedings of PerCom 2003,Dallas‐Fort Worth, TX,March, pp. 489‐96.
2. Securing Communications in the Smart Home
3. Becker, M.Y. and Sewell, P. (2004), “Cassandra: flexible trust management, applied to electronic health records”,Proceedings of the 17th IEEE Computer Security Foundations Workshop, pp. 139‐54.
4. Campbell, R., Al‐Muhtadi, J., Ranganathan, A. and Mickunas, M.D. (2002), “A flexible, privacy‐persevering authentication framework for ubiquitous computing environments”,Proceedings of the 22nd International Workshop on Smart Appliances and Wearable Computing,Vienna, pp. 771‐6.
5. Chadha, R., Cheng, Y.‐H., Cheng, T., Gadgil, S., Hafid, A., Kim, K., Levin, G., Natarajan, N., Parmeswaran, K., Poylisher, A. and Unger, J. (2003), “PECAN: policy‐enabled configuration across networks”,Proceedings of the Fourth International Workshop on Policies for Distributed Systems and Networks,June, pp. 52‐62.