<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=privaxy">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=privaxy]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for privaxy]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/42/A-Security-Architecture-Based-on-Trust-Management-for-Pervasive-Computing-Systems"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/42/A-Security-Architecture-Based-on-Trust-Management-for-Pervasive-Computing-Systems">
  <title><![CDATA[A Security Architecture Based on Trust Management for Pervasive Computing Systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/42/A-Security-Architecture-Based-on-Trust-Management-for-Pervasive-Computing-Systems</link>
  <description><![CDATA[Traditionally, stand-alone computers and small networks rely on
user authentication and access control to provide security. These
physical methods use system-based controls to verify the identity
of a person or process, explicitly enabling or restricting the ability
to use, change, or view a computer resource. However, these
strategies are inadequate for the increased flexibility that distributed
networks such as the Internet and ubiquitous/pervasive computing
environments require as t...]]></description>
  <dc:date>2002-10-09</dc:date>
 </item>
</rdf:RDF>
