{"title":"评估基于信任的社会互动访问控制","authors":"Lang Jia, M. Collins, P. Nixon","doi":"10.1109/UBICOMM.2009.43","DOIUrl":null,"url":null,"abstract":"Ubiquitous computing connects computers, places, people and everyday objects together by providing the support for social interactions in our everyday computing environment. Such interactions are usually impersonal, interpersonal","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Evaluating Trust-Based Access Control for Social Interaction\",\"authors\":\"Lang Jia, M. Collins, P. Nixon\",\"doi\":\"10.1109/UBICOMM.2009.43\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ubiquitous computing connects computers, places, people and everyday objects together by providing the support for social interactions in our everyday computing environment. Such interactions are usually impersonal, interpersonal\",\"PeriodicalId\":150024,\"journal\":{\"name\":\"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UBICOMM.2009.43\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UBICOMM.2009.43","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluating Trust-Based Access Control for Social Interaction
Ubiquitous computing connects computers, places, people and everyday objects together by providing the support for social interactions in our everyday computing environment. Such interactions are usually impersonal, interpersonal