1. Abowd G.D. 2016. Beyond Weiser: From Ubiquitous to Collective Computing, Computer, 49 (1): 17-23.
2. Weiser M. 1991. The Computer for the 21st Century, Scientific American, 265 (3): 78-89.
3. Al-Muhtadi J., Ranganathan A., Campbell R., Mickunas M.D. 2003. Cerberus: A Context-aware Security Scheme for Smart Spaces, Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications, pp489-494, 23-26 March, Texas.
4. Covington M.J., Long W., Srinivasan S., Dey A.K., Ahamad M., Abowd G.D. 2001. Securing Context-aware Applications Using Environmental Roles, SACMAT ’01 Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, pp10-20, 3-4 May, Chantilly.
5. Covington M.J., Fogla P., Zhan Z., Ahamad M. 2002. A Context-aware Security Architecture for Emerging Applications, Proceedings of 18th Annual Computer Security Applications Conference, pp124-131, 9-13 December, New Orleans.