Author of the publication

Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments.

, , and . GPC, volume 4459 of Lecture Notes in Computer Science, page 348-361. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proximity-Based Trust Inference for Mobile Social Networking., , and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 253-264. Springer, (2011)The Chameleon: A Pervasive Grid Security Architecture., , and . ICNS, page 48. IEEE Computer Society, (2007)Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications., , and . J. Netw. Comput. Appl., 34 (2): 783-795 (2011)Context Adapted Certificate Using Morph Template Signature for Pervasive Environments., , and . UCS, volume 4836 of Lecture Notes in Computer Science, page 17-32. Springer, (2007)Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks., , and . ICUMT, page 1-8. IEEE, (2009)Security in Distributed Collaborative Environments: Limitations and Solutions., , and . Emergent Web Intelligence, Springer, (2010)(Dis)trust certification model for large access in a pervasive environment., , and . Int. J. Pervasive Comput. Commun., 1 (4): 289-299 (2005)Dependability in dynamic, evolving and heterogeneous systems: the connect approach., , , , and . SERENE, page 83-88. ACM, (2010)Security-by-Contract-with-Trust for Mobile Devices., , , , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 1 (4): 75-91 (2010)APC: access pass certificate distrust certification model for large access in pervasive environment., , and . ICPS, page 361-370. IEEE Computer Society, (2005)