Access control framework in a bring your own device environment
As a result of several attractive features of mobile devices (portability and access to voice and data services), people have started to take their mobile devices to their work place and connect to the company network to do their daily job. This has given rise to a policy called "Bring Your...
Saved in:
Main Author: | Morufu, Olalere |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/69392/1/FSKTM%202016%2043%20-%20IR.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Development Of A New Security Framework For Bring Your Own Device
by: Sanaa Abdoussalam Ammar Ennajeh -
The effect of Bring your own device (BYOD) implementation / Suhaimi Daud
by: Daud, Suhaimi
Published: (2016) -
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
by: Md. Zain, Zamhariah
Published: (2018) -
Bring-your-own device (BYOD) guidance: information security considerations and recommendations for Malaysian army in Peninsular Malaysia /
by: Fikri Hanis Md Badarudin
Published: (2022) -
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)