Return to Article Details Access Control through Trust Management in Ubiquitous Computing under Uncertain Environment Download Download PDF