Towards enforcing on-the-fly policies in BYOD environments

@article{Costantino2013TowardsEO,
  title={Towards enforcing on-the-fly policies in BYOD environments},
  author={Gianpiero Costantino and Fabio Martinelli and Andrea Saracino and Daniele Sgandurra},
  journal={2013 9th International Conference on Information Assurance and Security (IAS)},
  year={2013},
  pages={61-65}
}
The Bring Your Own Device (BYOD) paradigm is becoming extremely popular across all kind of organizations. In fact, employees are continually trying to incorporate their personal devices, e.g. smartphones and tablets, into the office to perform some of their work or simply to access the Internet with a device they trust or they are more familiar with. Unfortunately, several security issues may arise from all these external devices accessing the corporate network. To address these issues, in this… CONTINUE READING
6 Citations
12 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Mobile phone work group mobile reference architecture

  • 2013. [Online]. Available: http://www…
  • 2013
1 Excerpt

Mobile phone work group mobile trusted module specification, version 1.0, reVISIOn 7.02

  • Trusted Computing Group
  • 2013. [Online]. Available: http://www…
  • 2013
1 Excerpt

Remote enforcement of trusted execution for mobile appli­ cations

  • F. Martinelli, I. Matteucci, A. Saracino, D. Sgandurra
  • To appear in proceedings of the 5th International…
  • 2013
1 Excerpt

Mobile consumerization trends & percep­ tions

  • I. Trend Micro
  • 2012.
  • 2012
2 Excerpts

Similar Papers

Loading similar papers…