Human-to-Human authorization for resource sharing in SHAD: Roles and protocols

Enrique Soriano, Francisco J. Ballesteros, Gorka Guardiola. Human-to-Human authorization for resource sharing in SHAD: Roles and protocols. Pervasive and Mobile Computing, 3(6):677-697, 2007. [doi]

@article{SorianoBG07:0,
  title = {Human-to-Human authorization for resource sharing in SHAD: Roles and protocols},
  author = {Enrique Soriano and Francisco J. Ballesteros and Gorka Guardiola},
  year = {2007},
  doi = {10.1016/j.pmcj.2007.07.001},
  url = {http://dx.doi.org/10.1016/j.pmcj.2007.07.001},
  tags = {protocol},
  researchr = {https://researchr.org/publication/SorianoBG07%3A0},
  cites = {0},
  citedby = {0},
  journal = {Pervasive and Mobile Computing},
  volume = {3},
  number = {6},
  pages = {677-697},
}