Researches to the trusted ubiquitous computing
The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 437 |
---|---|
container_issue | |
container_start_page | 433 |
container_title | |
container_volume | |
creator | Daoqing Sun |
description | The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted ubiquitous computing researches. At last, the related researches and a simple example were mentioned to support the researches. |
doi_str_mv | 10.1109/ICECC.2011.6067854 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6067854</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6067854</ieee_id><sourcerecordid>6067854</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-b594ae4f90b2b4f3d5ceb52c34231cdc03b8fea221fa3e8261a754e08a09b68c3</originalsourceid><addsrcrecordid>eNo1j81Kw0AURkdEUGteQDd5gcR753-WElotFATRdZmZ3NgRa2pmsvDtK1i_zeFsDnyM3SK0iODu192y61oOiK0GbaySZ6xyxqJUxoDgaM_Z9b-AuGRVzh_wO60dN-aKtS-UyU9xR7kuY112VJdpzoX6eg7pe05lnHMdx_1hLunr_YZdDP4zU3Xigr2tlq_dU7N5flx3D5smoVGlCcpJT3JwEHiQg-hVpKB4FJILjH0EEexAnnMcvCDLNXqjJIH14IK2USzY3V83EdH2MKW9n362p4viCHwXROo</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Researches to the trusted ubiquitous computing</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Daoqing Sun</creator><creatorcontrib>Daoqing Sun</creatorcontrib><description>The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted ubiquitous computing researches. At last, the related researches and a simple example were mentioned to support the researches.</description><identifier>ISBN: 1457703203</identifier><identifier>ISBN: 9781457703201</identifier><identifier>EISBN: 9781457703218</identifier><identifier>EISBN: 145770319X</identifier><identifier>EISBN: 1457703211</identifier><identifier>EISBN: 9781457703195</identifier><identifier>DOI: 10.1109/ICECC.2011.6067854</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Computational modeling ; Decision making ; Educational institutions ; security ; Sun ; trust ; Ubiquitous computing</subject><ispartof>2011 International Conference on Electronics, Communications and Control (ICECC), 2011, p.433-437</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6067854$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6067854$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Daoqing Sun</creatorcontrib><title>Researches to the trusted ubiquitous computing</title><title>2011 International Conference on Electronics, Communications and Control (ICECC)</title><addtitle>ICECC</addtitle><description>The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted ubiquitous computing researches. At last, the related researches and a simple example were mentioned to support the researches.</description><subject>Authentication</subject><subject>Computational modeling</subject><subject>Decision making</subject><subject>Educational institutions</subject><subject>security</subject><subject>Sun</subject><subject>trust</subject><subject>Ubiquitous computing</subject><isbn>1457703203</isbn><isbn>9781457703201</isbn><isbn>9781457703218</isbn><isbn>145770319X</isbn><isbn>1457703211</isbn><isbn>9781457703195</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1j81Kw0AURkdEUGteQDd5gcR753-WElotFATRdZmZ3NgRa2pmsvDtK1i_zeFsDnyM3SK0iODu192y61oOiK0GbaySZ6xyxqJUxoDgaM_Z9b-AuGRVzh_wO60dN-aKtS-UyU9xR7kuY112VJdpzoX6eg7pe05lnHMdx_1hLunr_YZdDP4zU3Xigr2tlq_dU7N5flx3D5smoVGlCcpJT3JwEHiQg-hVpKB4FJILjH0EEexAnnMcvCDLNXqjJIH14IK2USzY3V83EdH2MKW9n362p4viCHwXROo</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Daoqing Sun</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>Researches to the trusted ubiquitous computing</title><author>Daoqing Sun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-b594ae4f90b2b4f3d5ceb52c34231cdc03b8fea221fa3e8261a754e08a09b68c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authentication</topic><topic>Computational modeling</topic><topic>Decision making</topic><topic>Educational institutions</topic><topic>security</topic><topic>Sun</topic><topic>trust</topic><topic>Ubiquitous computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Daoqing Sun</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Daoqing Sun</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Researches to the trusted ubiquitous computing</atitle><btitle>2011 International Conference on Electronics, Communications and Control (ICECC)</btitle><stitle>ICECC</stitle><date>2011-09</date><risdate>2011</risdate><spage>433</spage><epage>437</epage><pages>433-437</pages><isbn>1457703203</isbn><isbn>9781457703201</isbn><eisbn>9781457703218</eisbn><eisbn>145770319X</eisbn><eisbn>1457703211</eisbn><eisbn>9781457703195</eisbn><abstract>The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted ubiquitous computing researches. At last, the related researches and a simple example were mentioned to support the researches.</abstract><pub>IEEE</pub><doi>10.1109/ICECC.2011.6067854</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1457703203 |
ispartof | 2011 International Conference on Electronics, Communications and Control (ICECC), 2011, p.433-437 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6067854 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Computational modeling Decision making Educational institutions security Sun trust Ubiquitous computing |
title | Researches to the trusted ubiquitous computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T23%3A14%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Researches%20to%20the%20trusted%20ubiquitous%20computing&rft.btitle=2011%20International%20Conference%20on%20Electronics,%20Communications%20and%20Control%20(ICECC)&rft.au=Daoqing%20Sun&rft.date=2011-09&rft.spage=433&rft.epage=437&rft.pages=433-437&rft.isbn=1457703203&rft.isbn_list=9781457703201&rft_id=info:doi/10.1109/ICECC.2011.6067854&rft_dat=%3Cieee_6IE%3E6067854%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457703218&rft.eisbn_list=145770319X&rft.eisbn_list=1457703211&rft.eisbn_list=9781457703195&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6067854&rfr_iscdi=true |