37 research outputs found

    Summary, Conclusions, and Recommendations

    No full text

    The Internet public key infrastructure

    Full text link

    Realizing Macro Based Technique for Behavioral Attestation on Remote Platform

    No full text

    Semantic Access Control for Corporate Mobile Devices

    No full text
    Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totallyDepartment of Computer Engineering, Yasar University, Universite cad. No:35-37, 35100 Bornova, Izmir, Turkey; Global Technology Services, IBM Australia, Melbourne, Australi
    corecore