Searched for: "security policies and trust in ubiquitous computing"
About 2 results for "security policies and trust in ubiquitous computing"
Defending the last missing pixels: Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state
Since writing the PGP encryption software in the 1990s, Phil Zimmermann has been a key figure in the internet privacy debate. With that argument heating up again, his perspective i...
In this paper, the authors have classified stakeholders and objects, while concentrating on the specification for objects' usage at the stakeholder end. This will allow them to dep...