Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
Dependability and Configurability: Partners or Competitors in Pervasive Computing?
SAFECOMP '02 Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
Role-Based Access Control for E-commerce Sea-of-Data Applications
ISC '02 Proceedings of the 5th International Conference on Information Security
A secure pervasive environment
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Collaborative joins in a pervasive computing environment
The VLDB Journal — The International Journal on Very Large Data Bases
Authentification par la méfiance dans les systèmes pervasifs
UbiMob '05 Proceedings of the 2nd French-speaking conference on Mobility and ubiquity computing
Toward Distributed Service Discovery in Pervasive Computing Environments
IEEE Transactions on Mobile Computing
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Towards secure information sharing using role-based delegation
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Towards secure resource sharing for impromptu collaboration in pervasive computing
Proceedings of the 2007 ACM symposium on Applied computing
Access control to information in pervasive computing environments
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Trust model for certificate revocation in ad hoc networks
Ad Hoc Networks
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
An Efficient Device Authentication Protocol Using Bioinformatic
Computational Intelligence and Security
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
An aspect-oriented approach to securing distributed systems
Proceedings of the 2009 international conference on Pervasive services
Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments
Proceedings of the 2009 international conference on Pervasive services
A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Journal of Systems and Software
Policy Evolution in Distributed Usage Control
Electronic Notes in Theoretical Computer Science (ENTCS)
Proceedings of the 2nd international conference on Security of information and networks
Journal of Systems and Software
L'Elimination de la subjectivité dans la recommandation de confiance
Proceedings of the 5th French-Speaking Conference on Mobility and Ubiquity Computing
Promoting cooperation among strangers to access Internet services from an ad hoc network
Pervasive and Mobile Computing
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Program partitioning using dynamic trust models
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
A trust management scheme for enhancing security in pervasive wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Trust management in ubiquitous computing: A Bayesian approach
Computer Communications
Architecture and implementation of a trust model for pervasive applications
Journal of Mobile Multimedia
Deterministic trust management in pervasive computing
Journal of Mobile Multimedia
Extracting trust information from security system of a service
Journal of Network and Computer Applications
Some security issues of wireless systems
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
A model for flexible service use and secure resource management
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Information flow control to secure dynamic web service composition
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Security and Communication Networks
A multi-dimensional and event-based model for trust computation in the social web
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
Fuzzy colored time Petri net and termination analysis for fuzzy Event-Condition-Action rules
Information Sciences: an International Journal
Hi-index | 4.10 |
Pervasive computing systems require a security architecture based on trust rather than just user authentication and access control.