A Study on Context Information Collection for Personal Mobile Device Identification in BYOD and Smart Work Environment

With the advent of BYOD (bring your own device) environment where personal mobile devices are used in work, companies began introducing NAC and MDM systems to prevent the leaks of, to access control and to efficiently manage confidential information. However, NAC and MDM access control policy is uniformly applied to users, and thus BYOD is not being actively introduced as of current where security threats exist as a result of frequent device loss and theft as well as low security level. Therefore, flexible policy setting and control method through personalized information collection are necessary. This study discusses the definition of context information and a method to collect the information to detect users’ abnormal behaviors considering the diversity of devices used and connection environments for BYOD.

[1]  Jeffrey M. Voas,et al.  BYOD: Security and Privacy Considerations , 2012, IT Professional.

[2]  Dongho Won,et al.  Security Requirements of a Mobile Device Management System , 2012 .

[3]  Dimitris Gritzalis,et al.  Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[4]  Farnam Jahanian,et al.  Defeating TCP/IP Stack Fingerprinting , 2000, USENIX Security Symposium.

[5]  Manpreet Singh,et al.  Formal Specification of Common Criteria Based Access Control Policy Model , 2010, Int. J. Netw. Secur..

[6]  Manpreet Singh,et al.  A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment , 2009 .