[1]
A. R. Hurson, J. Ploskonka, Y. Jiao, H. Haridas: Security Issues and Solutions in Distributed Heterogeneous Mobile Database Systems, Advances in Computers, Vol. 61 (2004), pp.107-198.
DOI: 10.1016/s0065-2458(03)61003-x
Google Scholar
[2]
M. Leitner, S. Rinderle-Ma: A systematic review on security in Process-Aware Information Systems – Constitution, challenges, and future directions, Information and Software Technology, Vol. 56 (2014), pp.273-293.
DOI: 10.1016/j.infsof.2013.12.004
Google Scholar
[3]
D. G. Rosado, E. F. Medina, J. Lopez: Security services architecture for Secure Mobile Grid Systems, Journal of Systems Architecture, Vol. 57 (2011), pp.240-258.
DOI: 10.1016/j.sysarc.2010.05.009
Google Scholar
[4]
H. Yin, Q. Fu, C. Lin, Z. Tan, R. Ding, Y. Lin, Y. Li, Y. Fan: Mobile Police Information System Based on Web Services, Tsinghua Science & Technology, Vol. 11 (2006), pp.1-7.
DOI: 10.1016/s1007-0214(06)70146-8
Google Scholar
[5]
K. Barmpatsalou, D. Damopoulos, G. Kambourakis, V. Katos: A critical review of 7 years of Mobile Device Forensics, Digital Investigation, Vol. 10 (2013), pp.323-349.
DOI: 10.1016/j.diin.2013.10.003
Google Scholar
[6]
J. Swartz: Security systems for a mobile world, Technology in Society, Vol. 25 (2003), pp.5-25.
Google Scholar
[7]
D. Unal, M. U. Caglayan: A formal role-based access control model for security policies in multi-domain mobile networks, Computer Networks, Vol. 57 (2013), pp.30-350.
DOI: 10.1016/j.comnet.2012.09.018
Google Scholar
[8]
S. M. Dye, K. Scarfone: A standard for developing secure mobile applications, Computer Standards & Interfaces, Vol. 36 (2014), pp.524-530.
DOI: 10.1016/j.csi.2013.09.005
Google Scholar