Login / Signup

Security for Whom?: The Shifting Security Assumptions of Pervasive Computing.

Frank Stajano
Published in: ISSS (2002)
Keyphrases
  • pervasive computing
  • intrusion detection
  • access control
  • security policies
  • multi agent
  • data streams
  • ambient intelligence