T - dominance : Prioritized Defense Deployment for BYOD
نویسندگان
چکیده
Bring Your Own Device (BYOD) is an enterprise information technology (IT) policy that encourages employees to use their own devices to access sensitive corporate data at work through the enterprise IT infrastructure. Many current BYOD security practices are costly to implement and intrusive to employees, which, to some degree, negate BYOD’s perceived benefits. To address such tension, we propose prioritized defense deployment: Instead of employing the same costly and intrusive security measures on each BYOD smartphone, more stringent threat detection/mitigation mechanisms are deployed on those representative smartphones, each of which represents, securitywise, a group of smartphones in the whole BYOD device pool. To this end, we propose a concept and a distributed algorithm, both named T -dominance, to capture the temporal-spatial pattern in an enterprise environment. We identify a few desirable properties of prioritized defense deployment, and analytically show that T -dominance satisfies such properties. We complement our analysis with simulations on real Wi-Fi association traces.
منابع مشابه
Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...
متن کاملA Mobile App Development Guideline for Hospital Settings: Maximizing the Use of and Minimizing the Security Risks of "Bring Your Own Devices" Policies
BACKGROUND Hospitals today are introducing new mobile apps to improve patient care and workflow processes. Mobile device adoption by hospitals fits with present day technology behavior; however, requires a deeper look into hospital device policies and the impact on patients, staff, and technology development. Should hospitals spend thousands to millions of dollars to equip all personnel with a ...
متن کاملAppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management
Bring-your-own-device (BYOD) is getting popular. Diverse personal devices are used to access enterprise resources, and deployment of the solutions with customized operating system (OS) dependency will thus be restricted. Moreover, device utilization for both business and personal purposes creates new threats involving leakage of sensitive data. As for functionalities, a BYOD solution should iso...
متن کاملBYOD: Bring Your Own Device
In this work, we examine the different types of user interactions and deployment issues surrounding large public displays. We then select and develop a usage paradigm in which people use personal devices to interact with large public displays. Lastly, we present a physical interface for interacting with large public displays based on camera-enabled mobile phones. Our interface uses both Visual ...
متن کاملCustomer loyalty program based on quality function deployment with fuzzy linguistic preference relation
The competition among shopping malls is getting increasingly more intense.In order to enhance corporate competitiveness and profitability, how toretain key loyal customers has become an important issue for the managers ofshopping malls. Customer loyalty programs are a universal practice. Thisstudy proposes an analytical model for developing the strategic management...
متن کامل