Ali et al., 2015 - Google Patents
Analysis of BYOD security frameworksAli et al., 2015
- Document ID
- 6045023871618559139
- Author
- Ali S
- Qureshi M
- Abbasi A
- Publication year
- Publication venue
- 2015 Conference on Information Assurance and Cyber Security (CIACS)
External Links
Snippet
The trend of adapting BYOD or" Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are …
- 238000004458 analytical method 0 title description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
Ali et al. | Analysis of BYOD security frameworks | |
Eslahi et al. | BYOD: Current state and security challenges | |
Kazim et al. | A survey on top security threats in cloud computing | |
Bhadauria et al. | Survey on security issues in cloud computing and associated mitigation techniques | |
Alasmari et al. | Security & privacy challenges in IoT-based health cloud | |
Herrera et al. | National cyber-security policies oriented to BYOD (bring your own device): Systematic review | |
Ogie | Bring your own device: an overview of risk assessment | |
Ketel et al. | Bring your own device: Security technologies | |
Colomb et al. | Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud | |
Zambrano et al. | Bring your own device: a survey of threats and security management models | |
Ennajjar et al. | Security in cloud computing approaches and solutions | |
Butt et al. | Cloud and its security impacts on managing a workforce remotely: a reflection to cover remote working challenges | |
Shaghaghi et al. | Gargoyle: A network-based insider attack resilient framework for organizations | |
Manaa | Data encryption scheme for large data scale in cloud computing | |
Urias et al. | Applying a threat model to cloud computing | |
Wang et al. | MobileGuardian: A security policy enforcement framework for mobile devices | |
Telo | A Comparative Analysis of Network Security Technologies for Small and Large Enterprises | |
Patil et al. | Assessing the Landscape of Mobile Data Vulnerabilities: A Comprehensive Review | |
Ayele et al. | Threat actors and methods of attack to social robots in public spaces | |
Kim et al. | A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment | |
Kotkar et al. | Exploring security mechanisms to android device | |
Harshanath | Privacy and Security Data-sharing Technologies for Tampering Protection and Detection | |
Rohilla et al. | Comparison of Cloud Computing Security Threats and Their Counter Measures | |
El-Serngawy et al. | Securing business data on android smartphones |