-
4
-
-
72749098161
-
Location constraints for mobile workflows
-
Juan E. Agudo et al., Ed. Merida, Spain: IOS Press, September
-
M. Decker, P. Stürzel, S. Klink, and A. Oberweis, "Location constraints for mobile workflows," in Proceedings of the Conference on Techniques and Applications for Mobile Commerce (TaMoCo '09), Juan E. Agudo et al., Ed. Merida, Spain: IOS Press, September 2009, pp. 93-102.
-
(2009)
Proceedings of the Conference on Techniques and Applications for Mobile Commerce (TaMoCo '09)
, pp. 93-102
-
-
Decker, M.1
Stürzel, P.2
Klink, S.3
Oberweis, A.4
-
6
-
-
25844522088
-
-
Chichester, U.K.: John Wiley & Sons
-
R. Lake, D. S. Burggraf, M. Trninic, and L. Rae, GML. Geography Mark-Up Language. Foundation for the Geo-Web. Chichester, U.K.: John Wiley & Sons, 2004.
-
(2004)
GML. Geography Mark-Up Language. Foundation for the Geo-Web
-
-
Lake, R.1
Burggraf, D.S.2
Trninic, M.3
Rae, L.4
-
9
-
-
52149085945
-
Data security in location-aware applications: An approach based on RBAC
-
M. L. Damiani, E. Bertino, and P. Perlasca, "Data Security in Location-Aware Applications: An Approach Based on RBAC," International Journal, of Information and Computer Security, vol. 1, no. 1/2, pp. 5-38, 2007.
-
(2007)
International Journal, of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 5-38
-
-
Damiani, M.L.1
Bertino, E.2
Perlasca, P.3
-
11
-
-
74549174787
-
Prevention of location-spoofing. A survey on different methods to prevent the manipulation of locating-technologies
-
Milan, Italy
-
M. Decker, "Prevention of Location-Spoofing. A Survey on Different Methods to Prevent the Manipulation of Locating-Technologies," in Proceedings of the International Conference on e-Business (ICE-B), Milan, Italy, 2009.
-
(2009)
Proceedings of the International Conference on E-Business (ICE-B)
-
-
Decker, M.1
-
12
-
-
35248859792
-
Extending activity diagrams to model mobile systems
-
Erfurt, Germany
-
H. Baumeister, N. Koch, P. Kosiuczenko, and M. Wirsing, "Extending Activity Diagrams to Model Mobile Systems," in Proceedings of NetObjectDays (NOD), Erfurt, Germany, 2002, pp. 278-293.
-
(2002)
Proceedings of NetObjectDays (NOD)
, pp. 278-293
-
-
Baumeister, H.1
Koch, N.2
Kosiuczenko, P.3
Wirsing, M.4
-
13
-
-
0030189617
-
Exotica/FMDC: A workflow management system for mobile and disconnected. Clients
-
G. Alonso, R. Gnthr, M. Kamath, D. Agrawal, A. E. Abbadi, and C. Mohan, "Exotica/FMDC: A Workflow Management System for Mobile and Disconnected. Clients," Distributed and Parallel Databases, vol. 4, no. 3, pp. 229-247, 1996.
-
(1996)
Distributed and Parallel Databases
, vol.4
, Issue.3
, pp. 229-247
-
-
Alonso, G.1
Gnthr, R.2
Kamath, M.3
Agrawal, D.4
Abbadi, A.E.5
Mohan, C.6
-
14
-
-
0033892805
-
Wham: Supporting mobile workforce and applications in workflow environments
-
San Diego, California, USA
-
J. Jing, K. Huff, B. Hurwitz, H. Sinha, B. Robinson, and M. Feblowitz, "Wham: Supporting mobile workforce and applications in workflow environments," in Proceedings of 10th International Workshop on Research Issues in Data Engineering (RIDE), San Diego, California, USA, 2000, pp. 31-38.
-
(2000)
Proceedings of 10th International Workshop on Research Issues in Data Engineering (RIDE)
, pp. 31-38
-
-
Jing, J.1
Huff, K.2
Hurwitz, B.3
Sinha, H.4
Robinson, B.5
Feblowitz, M.6
-
15
-
-
77954928904
-
Workflow-management mit mobile computing: ein überblick
-
in German, Bonn, Germany, to Appear
-
M. Decker, B. Keuter, S. Klink, A. Oberweis, and P Stürzel, "Workflow-Management mit Mobile Computing: Ein Überblick (in German)," in Proceedings des 6. KuVSFachge.spräch "Ortsbezogene Anwendungen und Dienste", Bonn, Germany, 2010, to Appear.
-
(2010)
Proceedings des 6. KuVSFachge.spräch Ortsbezogene Anwendungen und Dienste
-
-
Decker, M.1
Keuter, B.2
Klink, S.3
Oberweis, A.4
Stürzel, P.5
-
16
-
-
77954920765
-
Location contexts in role-based security policy enforcement
-
Las Vegas, Nevada, USA
-
R. Hewett and P Kijsanayothin, "Location contexts in role-based security policy enforcement," in Proceedings of the 2009 International Conference on Security and Management (SAM'09), Las Vegas, Nevada, USA, 2009, pp. 13-16.
-
(2009)
Proceedings of the 2009 International Conference on Security and Management (SAM'09)
, pp. 13-16
-
-
Hewett, R.1
Kijsanayothin, P.2
|