[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ali et al., 2015 - Google Patents

Analysis of BYOD security frameworks

Ali et al., 2015

Document ID
6045023871618559139
Author
Ali S
Qureshi M
Abbasi A
Publication year
Publication venue
2015 Conference on Information Assurance and Cyber Security (CIACS)

External Links

Snippet

The trend of adapting BYOD or" Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Shafiq et al. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
Ali et al. Analysis of BYOD security frameworks
Eslahi et al. BYOD: Current state and security challenges
Kazim et al. A survey on top security threats in cloud computing
Bhadauria et al. Survey on security issues in cloud computing and associated mitigation techniques
Alasmari et al. Security & privacy challenges in IoT-based health cloud
Herrera et al. National cyber-security policies oriented to BYOD (bring your own device): Systematic review
Ogie Bring your own device: an overview of risk assessment
Ketel et al. Bring your own device: Security technologies
Colomb et al. Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud
Zambrano et al. Bring your own device: a survey of threats and security management models
Ennajjar et al. Security in cloud computing approaches and solutions
Butt et al. Cloud and its security impacts on managing a workforce remotely: a reflection to cover remote working challenges
Shaghaghi et al. Gargoyle: A network-based insider attack resilient framework for organizations
Manaa Data encryption scheme for large data scale in cloud computing
Urias et al. Applying a threat model to cloud computing
Wang et al. MobileGuardian: A security policy enforcement framework for mobile devices
Telo A Comparative Analysis of Network Security Technologies for Small and Large Enterprises
Patil et al. Assessing the Landscape of Mobile Data Vulnerabilities: A Comprehensive Review
Ayele et al. Threat actors and methods of attack to social robots in public spaces
Kim et al. A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment
Kotkar et al. Exploring security mechanisms to android device
Harshanath Privacy and Security Data-sharing Technologies for Tampering Protection and Detection
Rohilla et al. Comparison of Cloud Computing Security Threats and Their Counter Measures
El-Serngawy et al. Securing business data on android smartphones