Login / Signup
Exploiting information relationships for access control in pervasive computing.
Urs Hengartner
Peter Steenkiste
Published in:
Pervasive Mob. Comput. (2006)
Keyphrases
</>
access control
pervasive computing
ubiquitous computing environments
daily life
data security
database
security policies