Access control framework in a bring your own device environment
As a result of several attractive features of mobile devices (portability and access to voice and data services), people have started to take their mobile devices to their work place and connect to the company network to do their daily job. This has given rise to a policy called "Bring Your...
| Main Author: | Morufu, Olalere |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/69392/ http://psasir.upm.edu.my/id/eprint/69392/1/FSKTM%202016%2043%20-%20IR.pdf |
Similar Items
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015)
by: Khoo, Wai Lung
Published: (2015)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
Bring your own digital device in teacher education
by: Newhouse, C., et al.
Published: (2015)
by: Newhouse, C., et al.
Published: (2015)
Secure software architecture approach for role-based access control using aspect-oriented design
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018)
by: Jamal, Fara, et al.
Published: (2018)
XML-based declarative access control
by: Steele, R., et al.
Published: (2005)
by: Steele, R., et al.
Published: (2005)
'Bring Your Own Device': Considering potential risks to student health
by: Merga, Margaret
Published: (2015)
by: Merga, Margaret
Published: (2015)
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007)
by: Nordin, Noorsalwati
Published: (2007)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)
by: Gooi, Hao Ming
Published: (2017)
Efficient XML queries and updates encoding scheme in the presence of access control using fractional numbers
by: Nooshabadi, Meghdad Mirabi
Published: (2013)
by: Nooshabadi, Meghdad Mirabi
Published: (2013)
Towards BYOD: examining Education student readiness for a policy of Bring Your Own Digital device at ECU
by: Pagram, J., et al.
Published: (2013)
by: Pagram, J., et al.
Published: (2013)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
SafeSearch – Microcomputer based VPN / Mohamad Ridzuan Mohd Alias
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Effectiveness of blended active learning framework using Bring Your Own Device Learning (BYODL), Project Based Learning (PPBL) and Gamification Learning (GL)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
Access Regulation and Infrastructure Investment in the Mobile Telecommunications Industry
by: Kim, J., et al.
Published: (2011)
by: Kim, J., et al.
Published: (2011)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
Open access books: an international collaboration to explore the practical implications for librarians of increasing access to scholarly research outputs
by: Zhou, Elsie, et al.
Published: (2018)
by: Zhou, Elsie, et al.
Published: (2018)
2.46 ghz helical antenna design for wimax and wifi application / Dayang Suhaida Awang Damit, Samihah Abdullah and Rohaiza Baharudin
by: Awang Damit, Dayang Suhaida, et al.
Published: (2013)
by: Awang Damit, Dayang Suhaida, et al.
Published: (2013)
Factors affecting acceptance of “Bring Your Own Device” (BYOD) policy at HeiTech Padu Berhad / Najuwa Aqilah Mohd Muslim
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
Chronic disease, geographic location and socioeconomic disadvantage as obstacles to equitable access to e-health
by: Han, J., et al.
Published: (2010)
by: Han, J., et al.
Published: (2010)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
Business Model Canvas : Ample Power Company / Noor Amira Zaharlim
by: Zaharlim, Noor Amira
Published: (2020)
by: Zaharlim, Noor Amira
Published: (2020)
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
The Copyright Amendment (Access Reform) Bill 2021 And Open Access: A Comparative Legal Perspective
by: Koutras, Nikos
Published: (2023)
by: Koutras, Nikos
Published: (2023)
Open access to scholarly communications: advantages, policy and advocacy
by: FURNIVAL, Ariadne Chloe
Published: (2010)
by: FURNIVAL, Ariadne Chloe
Published: (2010)
DRIVER: Building the Network for Accessing Digital Repositories across Europe
by: Feijen, Martin, et al.
Published: (2007)
by: Feijen, Martin, et al.
Published: (2007)
Bringing learning to your doorstep
by: The Star
Published: (2018)
by: The Star
Published: (2018)
Web-based learning environments for the vision impaired
by: Permvattana, Ruchi, et al.
Published: (2010)
by: Permvattana, Ruchi, et al.
Published: (2010)
A framework implementation for information accuracy in mobile commerce / Emafazzila Baharudin
by: Baharudin, Emafazzila
Published: (2007)
by: Baharudin, Emafazzila
Published: (2007)
The Right to Roam: A review of policy and management of public access to land
by: Hughes, Michael, et al.
Published: (2011)
by: Hughes, Michael, et al.
Published: (2011)
Accessing scientific information
by: Escobedo, Ángel, et al.
Published: (2017)
by: Escobedo, Ángel, et al.
Published: (2017)
Public resource or private sanctuary?: access patterns and narratives from the woodland of North East Derbyshire
by: Lisewski-Hobson, Vivyan
Published: (2019)
by: Lisewski-Hobson, Vivyan
Published: (2019)
Similar Items
-
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015) -
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016) -
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015) -
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014) -
Bring your own digital device in teacher education
by: Newhouse, C., et al.
Published: (2015)