An Evaluation of the Proposed Framework for Access Control in the Cloud and BYOD Environment
暂无分享,去创建一个
[1] Phil Beckett. BYOD - popular and problematic , 2014, Netw. Secur..
[2] Andrea Estefania Vaca Herrera,et al. National cyber-security policies oriented to BYOD (bring your own device): Systematic review , 2017, 2017 12th Iberian Conference on Information Systems and Technologies (CISTI).
[3] Azman Samsudin,et al. Trusted Security Policies for Tackling Advanced Persistent Threat via Spear Phishing in BYOD Environment , 2015 .
[4] Madhavi Dhingra. Legal Issues in Secure Implementation of Bring Your Own Device (BYOD) , 2016 .
[5] Manmeet Mahinderjit Singh,et al. Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm , 2017 .
[6] Sonia Blizzard. Coming full circle: are there benefits to BYOD? , 2015 .
[7] Melva M. Ratchford. BYOD: A Security Policy Evaluation Model , 2018 .
[8] Daniele Sgandurra,et al. Towards enforcing on-the-fly policies in BYOD environments , 2013, 2013 9th International Conference on Information Assurance and Security (IAS).
[9] Nima Zahadat,et al. BYOD security engineering: A framework and its analysis , 2015, Comput. Secur..
[10] Yan Bai,et al. 2TAC: Distributed Access Control Architecture for "Bring Your Own Device" Security , 2012, 2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom).
[11] Bill Morrow,et al. BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..
[12] Rodrigo Muñoz,et al. Bring Your Own Device , 2012 .
[13] Khoula AlHarthy,et al. Implement network security control solutions in BYOD environment , 2013, 2013 IEEE International Conference on Control System, Computing and Engineering.
[14] Juan Julián Merelo Guervós,et al. Corporate security solutions for BYOD: A novel user-centric and self-adaptive system , 2015, Comput. Commun..
[15] Kamal Jambi,et al. Survey on Access Control and Management Issues in Cloud and BYOD Environment , 2017 .
[16] Mohammed Ketel,et al. Bring Your Own Device: Benefits, risks and control techniques , 2014, IEEE SOUTHEASTCON 2014.
[17] J. Armarego,et al. Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments , 2015 .
[18] Budi Yulianto,et al. An Implementation of Location Based Service (LBS) for Community Tracking , 2017 .
[19] John Thielens. Why APIs are central to a BYOD security strategy , 2013, Netw. Secur..
[20] Siddhi Pittayachawan,et al. Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach , 2015, Comput. Secur..
[21] M. Eslahi,et al. MoBots: A new generation of botnets on mobile devices and networks , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).
[22] U. Vignesh,et al. Modifying Security Policies Towards BYOD , 2015 .