Loading… Taking too long? Reload document | Open in new tab previousA Recommendation Model for Security Risk Management in Car-Sharing ScenariosnextSecure and Privacy-Preserving Car-Sharing Systems