The Mobile Execution Environment: A Secure and Non-Intrusive Approach to Implement a Bring You Own Device Policy for Laptops

@inproceedings{James2012TheME,
  title={The Mobile Execution Environment: A Secure and Non-Intrusive Approach to Implement a Bring You Own Device Policy for Laptops},
  author={Peter James and Don Griffiths},
  year={2012}
}
Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security risk mitigation/management strategy. This paper considers how a secure laptop software configuration… CONTINUE READING

Figures, Tables, and Topics from this paper.

Explore Further: Topics Discussed in This Paper

References

Publications referenced by this paper.
SHOWING 1-10 OF 11 REFERENCES

A Hardened Mobile Execution Environment to Enable Secure Remote Working

  • P James, D. Griffiths
  • 2012
VIEW 2 EXCERPTS

Bring Your Own Disaster, Secau – Security Research Centre seminar

  • C. Valli
  • Edith Cowan University, Joondalup, WA,
  • 2012
VIEW 1 EXCERPT

Ubuntu 12.04 vs. Windows 8: Five points of comparison, ZDNet

  • S. Vaughan-Nichols
  • Retrieved July 2012 from URL: http://www.zdnet.com/blog/open-source/ubuntu-12-04-vs-windows-8-fivepoints-of-comparison/10900
  • 2012
VIEW 1 EXCERPT

Application Virtualisation, SearchVirtualDesktop TechTarget

  • M. Rouse
  • Retrieved July 2012 from http://searchvirtualdesktop.techtarget.com/definition/app-virtualization
  • 2011
VIEW 2 EXCERPTS

Client-based Virtual Machine, SearchVirtualDesktop TechTarget

  • M. Rouse
  • Retrieved July 2012 from http://searchvirtualdesktop.techtarget.com/definition/Client-Based-Virtual-Machine
  • 2011
VIEW 2 EXCERPTS

Bring Your Own Computer Policies, The Generation V, November 2009, URL: http://www.thegenerationv.com/2009/11/bring-your-own-computer-byoc-policies.html

  • A. Paul
  • 2009
VIEW 2 EXCERPTS

Thin Client Benefits, Newburn Consulting

  • B. David
  • Version 1b,
  • 2002
VIEW 2 EXCERPTS