Semantic access control for corporate mobile devices

Loading...
Publication Logo

Date

2010

Authors

Tuncay Ercan
Mehmet Yildiz

Journal Title

Journal ISSN

Volume Title

Publisher

Springer-Verlag Berlin

Open Access Color

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations. © Springer-Verlag Berlin Heidelberg 2010. © 2011 Elsevier B.V. All rights reserved.

Description

Keywords

Access Control Mechanism, Business To Business, Business-to-consumer, Computing Environments, Corporate Resources, Different Domains, Mobile Business Application, Mobile Wireless Devices, Security Frameworks, Security Measure, Semantic Access, Semantic Web Technology, Service Description, User Devices, Algorithms, Mobile Devices, Security Systems, Semantic Web, Semantics, User Interfaces, Access Control, Access control mechanism, Business to business, Business-to-consumer, Computing environments, Corporate resources, Different domains, Mobile business application, Mobile wireless devices, Security frameworks, Security measure, Semantic access, Semantic Web technology, Service description, User devices, Algorithms, Mobile devices, Security systems, Semantic Web, Semantics, User interfaces, Access control

Fields of Science

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
1

Source

10th International Conference Algorithms and Architectures for Parallel Processing ICA3PP 2010

Volume

6082

Issue

PART 2

Start Page

198

End Page

+
PlumX Metrics
Citations

CrossRef : 1

Scopus : 2

Captures

Mendeley Readers : 9

SCOPUS™ Citations

2

checked on Apr 10, 2026

Web of Science™ Citations

2

checked on Apr 10, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
2.195

Sustainable Development Goals

SDG data is not available