A Study on Context Information Collection for Personal Mobile Device Identification in BYOD and Smart Work Environment
暂无分享,去创建一个
[1] Jeffrey M. Voas,et al. BYOD: Security and Privacy Considerations , 2012, IT Professional.
[2] Dongho Won,et al. Security Requirements of a Mobile Device Management System , 2012 .
[3] Dimitris Gritzalis,et al. Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[4] Farnam Jahanian,et al. Defeating TCP/IP Stack Fingerprinting , 2000, USENIX Security Symposium.
[5] Manpreet Singh,et al. Formal Specification of Common Criteria Based Access Control Policy Model , 2010, Int. J. Netw. Secur..
[6] Manpreet Singh,et al. A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment , 2009 .