dc.contributor.author | Ercan, T. | |
dc.contributor.author | Yildiz, M. | |
dc.date.accessioned | 2021-01-25T20:51:33Z | |
dc.date.available | 2021-01-25T20:51:33Z | |
dc.date.issued | 2010 | |
dc.identifier | 10.1007/978-3-642-13136-3_20 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-79956267881&doi=10.1007%2f978-3-642-13136-3_20&partnerID=40&md5=fb4d2a517f7191e2d53892c977a40c00 | |
dc.identifier.uri | https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/10662 | |
dc.description.abstract | Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally | |
dc.language.iso | English | |
dc.publisher | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.title | Semantic access control for corporate mobile devices | |
dc.type | Conference Paper | |
dc.relation.firstpage | 198 | |
dc.relation.lastpage | 207 | |
dc.relation.volume | 6082 LNCS | |
dc.relation.issue | PART 2 | |
dc.description.affiliations | Department of Computer Engineering, Yasar University, Universite cad. No:35-37, 35100 Bornova, Izmir, Turkey; Global Technology Services, IBM Australia, Melbourne, Australia | |