Tuncay ErcanMehmet YildizErcan, TuncayYildiz, Mehmet2025-10-0620109789819698936, 9789819698042, 9789819698110, 9789819698905, 9789819512324, 9783032026019, 9783032008909, 9783031915802, 9789819698141, 97830319841363642131352978364213135616113349, 030297431611-33490302-974310.1007/978-3-642-13136-3_202-s2.0-79956267881https://www.scopus.com/inward/record.uri?eid=2-s2.0-79956267881&doi=10.1007%2F978-3-642-13136-3_20&partnerID=40&md5=1c54b9939a58b3db801601c796c99aa8https://gcris.yasar.edu.tr/handle/123456789/10273https://doi.org/10.1007/978-3-642-13136-3_20Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations. © Springer-Verlag Berlin Heidelberg 2010. © 2011 Elsevier B.V. All rights reserved.Englishinfo:eu-repo/semantics/closedAccessAccess Control Mechanism, Business To Business, Business-to-consumer, Computing Environments, Corporate Resources, Different Domains, Mobile Business Application, Mobile Wireless Devices, Security Frameworks, Security Measure, Semantic Access, Semantic Web Technology, Service Description, User Devices, Algorithms, Mobile Devices, Security Systems, Semantic Web, Semantics, User Interfaces, Access ControlAccess control mechanism, Business to business, Business-to-consumer, Computing environments, Corporate resources, Different domains, Mobile business application, Mobile wireless devices, Security frameworks, Security measure, Semantic access, Semantic Web technology, Service description, User devices, Algorithms, Mobile devices, Security systems, Semantic Web, Semantics, User interfaces, Access controlSemantic access control for corporate mobile devicesConference Object