Pervasive Computing Applications-2



A Trust-Based Access Control Model for Pervasive Computing Applications

FREE-DOWNLOAD [PDF] M Toahchoodee, R Abdunabi, I Ray… – Data and Applications …, 2009
Abstract. With the rapid growth in wireless networks and sensor and mobile devices, we are moving
towards an era of pervasive computing. Access control is challenging in these environments.
In this work, we propose a trust based ap- proach for access control for pervasive