Mobility Management for Enterprises in BYOD Deployment
暂无分享,去创建一个
Lu Wang | Daniel Tse | Yuxi Li
[1] Daniele Sgandurra,et al. Towards enforcing on-the-fly policies in BYOD environments , 2013, 2013 9th International Conference on Information Assurance and Security (IAS).
[2] Jeffrey M. Voas,et al. BYOD: Security and Privacy Considerations , 2012, IT Professional.
[3] Maryam Var Naseri,et al. BYOD: Current state and security challenges , 2014, 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE).
[4] Juan Julián Merelo Guervós,et al. Corporate security solutions for BYOD: A novel user-centric and self-adaptive system , 2015, Comput. Commun..
[5] K. Scarfone,et al. Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .
[6] Khoula AlHarthy,et al. Implement network security control solutions in BYOD environment , 2013, 2013 IEEE International Conference on Control System, Computing and Engineering.
[7] Antonio Scarfò,et al. New Security Perspectives around BYOD , 2012, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications.
[8] Hormazd Romer,et al. Best practices for BYOD security , 2014 .
[9] Arunkumar Gangula,et al. Survey on Mobile Computing Security , 2013, 2013 European Modelling Symposium.
[10] Bill Morrow,et al. BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..
[11] Shashikant Rai,et al. BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES , 2013 .
[12] Yong Wang,et al. Bring your own device security issues and challenges , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).