DBSEC   2009
Wall of Fame | Most Viewed DBSEC-2009 Paper
163views Database» more  DBSEC 2009»
12 years 4 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source163
2Download preprint from source130
3Download preprint from source124
4Download preprint from source122
5Download preprint from source112
6Download preprint from source110
7Download preprint from source110
8Download preprint from source94
9Download preprint from source81