Human-to-Human authorization for resource sharing in SHAD: Roles and protocols

Enrique Soriano, Francisco J. Ballesteros, Gorka Guardiola. Human-to-Human authorization for resource sharing in SHAD: Roles and protocols. Pervasive and Mobile Computing, 3(6):677-697, 2007. [doi]

Abstract

Abstract is missing.