A Model for Attribute-Based User-Role Assignment
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Role-based access control on the web using LDAP
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Modelling Contexts in the Or-BAC Model
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Querying and Updating a Context-Aware Service Directory in Mobile Environments
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Designing an Agent-Based RBAC System for Dynamic Security Policy
WETICE '04 Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Attributed Based Access Control (ABAC) for Web Services
ICWS '05 Proceedings of the IEEE International Conference on Web Services
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Adaptive Semantic Support Provisioning in Mobile Internet Environments
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
A software retrieval service based on adaptive knowledge-driven agents for wireless environments
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Lightweight Ontology-Based Service Discovery in Mobile Environments
DEXA '06 Proceedings of the 17th International Conference on Database and Expert Systems Applications
Enforcing access control over data streams
Proceedings of the 12th ACM symposium on Access control models and technologies
Activity-based Access Control Model to Hospital Information
RTCSA '07 Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
Context-aware information retrieval on a ubiquitous medical learning environment
Proceedings of the 2008 ACM symposium on Applied computing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Iterative Search for Similar Documents on Mobile Devices
KI '08 Proceedings of the 31st annual German conference on Advances in Artificial Intelligence
An Ontology-Based Profiling and Recommending System for Mobile TV
SMAP '08 Proceedings of the 2008 Third International Workshop on Semantic Media Adaptation and Personalization
Towards Efficient Reality Mining with Contexts and Semantics: A Case Study of Telecommunication
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 03
An Ontology-Based Framework for Discovering Mobile Services
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
A Semantic Context Management Framework on Mobile Device
ICESS '09 Proceedings of the 2009 International Conference on Embedded Software and Systems
Developing Mobile Ontologies; Who, Why, Where, and How?
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
Semantic template generation based information summarization for mobile devices
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
Hi-index | 0.00 |
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations.