Login / Signup

Human-to-Human authorization for resource sharing in SHAD: Roles and protocols.

Enrique SorianoFrancisco J. BallesterosGorka Guardiola
Published in: Pervasive Mob. Comput. (2007)
Keyphrases
  • resource sharing
  • operating system
  • distributed computing