Sign in

A Trust-Based Access Control Model for Pervasive Computing Applications.

Manachai ToahchoodeeRamadan AbdunabiIndrakshi RayIndrajit Ray
Published in: DBSec (2009)
Keyphrases
  • pervasive computing
  • trust model
  • probabilistic model
  • management system
  • reinforcement learning
  • user behavior