Show simple item record

dc.contributor.authorErcan, T.
dc.contributor.authorYildiz, M.
dc.date.accessioned2021-01-25T20:51:33Z
dc.date.available2021-01-25T20:51:33Z
dc.date.issued2010
dc.identifier10.1007/978-3-642-13136-3_20
dc.identifier.issn03029743
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-79956267881&doi=10.1007%2f978-3-642-13136-3_20&partnerID=40&md5=fb4d2a517f7191e2d53892c977a40c00
dc.identifier.urihttps://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/10662
dc.description.abstractMany of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally
dc.language.isoEnglish
dc.publisherLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.titleSemantic access control for corporate mobile devices
dc.typeConference Paper
dc.relation.firstpage198
dc.relation.lastpage207
dc.relation.volume6082 LNCS
dc.relation.issuePART 2
dc.description.affiliationsDepartment of Computer Engineering, Yasar University, Universite cad. No:35-37, 35100 Bornova, Izmir, Turkey; Global Technology Services, IBM Australia, Melbourne, Australia


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record