메뉴 건너뛰기




Volumn , Issue , 2009, Pages

An UML profile for the modelling of mobile business processes and workflows

Author keywords

Activity Diagrams; Location based Services; Mobile Business Processes Workflows; Modelling; UML; Usecase Diagrams

Indexed keywords

GLOBAL POSITIONING SYSTEM; INFORMATION SYSTEMS; INFORMATION USE; LOCATION; MODELS; MULTIMEDIA SYSTEMS; TELECOMMUNICATION EQUIPMENT; TELECOMMUNICATION SERVICES;

EID: 85083937906     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4108/ICST.MOBIMEDIA2009.8002     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 8
    • 74549174787 scopus 로고    scopus 로고
    • Prevention of location-spoofing. A survey on different methods to prevent the manipulation of Locating-Technologies
    • Milano, Italy
    • M. Decker. Prevention of Location-Spoofing. A Survey on Different methods to Prevent the Manipulation of Locating-Technologies. In Proceedings of the International Conference on e-Business (ICE-B), pages 109–114, Milano, Italy, 2009.
    • (2009) Proceedings of the International Conference on E-Business (ICE-B) , pp. 109-114
    • Decker, M.1
  • 9
    • 35048812256 scopus 로고    scopus 로고
    • Analysis of mobile business processes for the design of mobile information systems
    • Zaragoza, Spain
    • A. Köhler and V. Gruhn. Analysis of mobile business processes for the design of mobile information systems. In EC-WEB 2004, pages 238–247, Zaragoza, Spain, 2004.
    • (2004) EC-WEB 2004 , pp. 238-247
    • Köhler, A.1    Gruhn, V.2
  • 15
    • 32444439291 scopus 로고    scopus 로고
    • Towards a location-based mandatory access control model
    • I. Ray and M. Kumar. Towards a Location-based Mandatory Access Control Model. Computers & Security, 25(1):36–44, 2006.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 36-44
    • Ray, I.1    Kumar, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.