Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages. Data can be leaked because of the weak authentication technique used to verify the user and the de...
| Main Authors: | Jamal, Fara, Abdullah@Selimun, Mohd. Taufik, Abdullah, Azizol, Mohd Hanapi, Zurina |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publishing Corporation
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/72570/ http://psasir.upm.edu.my/id/eprint/72570/1/Enhanced%20Bring%20your%20Own%20Device.pdf |
Similar Items
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)
by: Gooi, Hao Ming
Published: (2017)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Towards BYOD: examining Education student readiness for a policy of Bring Your Own Digital device at ECU
by: Pagram, J., et al.
Published: (2013)
by: Pagram, J., et al.
Published: (2013)
Factors affecting acceptance of “Bring Your Own Device” (BYOD) policy at HeiTech Padu Berhad / Najuwa Aqilah Mohd Muslim
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016)
by: Morufu, Olalere
Published: (2016)
Bring your own digital device in teacher education
by: Newhouse, C., et al.
Published: (2015)
by: Newhouse, C., et al.
Published: (2015)
'Bring Your Own Device': Considering potential risks to student health
by: Merga, Margaret
Published: (2015)
by: Merga, Margaret
Published: (2015)
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015)
by: Khoo, Wai Lung
Published: (2015)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Effectiveness of blended active learning framework using Bring Your Own Device Learning (BYODL), Project Based Learning (PPBL) and Gamification Learning (GL)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
Bringing learning to your doorstep
by: The Star
Published: (2018)
by: The Star
Published: (2018)
BYOD public system
by: Lee, Brenda Mun Yee
Published: (2015)
by: Lee, Brenda Mun Yee
Published: (2015)
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
by: Jamal, Fara, et al.
Published: (2019)
by: Jamal, Fara, et al.
Published: (2019)
Make your own disinfectant
by: Goh, Choon Fu, et al.
Published: (2020)
by: Goh, Choon Fu, et al.
Published: (2020)
Ignore It At Your Own Risk
by: New Straits Times,
Published: (2008)
by: New Straits Times,
Published: (2008)
The health benefits and risks of growing-your-own produce in an urban environment
by: Stubberfield, Jonathan
Published: (2018)
by: Stubberfield, Jonathan
Published: (2018)
Make your own natural fertilisers
by: Md Jaafar, Noraini
Published: (2023)
by: Md Jaafar, Noraini
Published: (2023)
Do good with your life and bring happiness to others
by: UMP, PNC
Published: (2020)
by: UMP, PNC
Published: (2020)
Impact of BYOD on organizational commitment: an empirical investigation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
Build your own social-networking site
Published: (2008)
Published: (2008)
Cut Costs Plant Your Own Vegetables
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
Kick-start your own community garden
by: Arif Shah, Jasmin
Published: (2023)
by: Arif Shah, Jasmin
Published: (2023)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
QR-map: BYOD indoor map directory service.
by: Ang, Jenn Ning
Published: (2013)
by: Ang, Jenn Ning
Published: (2013)
Avoid making your own disinfectant, warns researcher
by: Asrol, Awang
Published: (2020)
by: Asrol, Awang
Published: (2020)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Use Your Own Device (UYOD) guidelines as a mechanism to enable sustainable mobile learning in a higher education institution
by: Igbrude, Claudia
Published: (2018)
by: Igbrude, Claudia
Published: (2018)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
A framework for blockchain and internet of things integration in improving food security in the food supply chain
by: Guixia, Xiao, et al.
Published: (2024)
by: Guixia, Xiao, et al.
Published: (2024)
Psycho-geographical Choose Your Own Adventure: A city in the outermost west
by: Fyfe, A., et al.
Published: (2023)
by: Fyfe, A., et al.
Published: (2023)
Blockchain-based secure medical record sharing system
by: Tian, Xiang Yang
Published: (2019)
by: Tian, Xiang Yang
Published: (2019)
Blockchain-enabled cloud services for secure and transparent data management in SMEs
by: Ali, Abdifatah Farah, et al.
Published: (2024)
by: Ali, Abdifatah Farah, et al.
Published: (2024)
“Find One of Your Own Kind”: Auto-ethnography and my Aboriginal Women Ancestors
by: Dowling, Carol Susan
Published: (2017)
by: Dowling, Carol Susan
Published: (2017)
Similar Items
-
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020) -
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014) -
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015) -
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
by: Doargajudhur, M., et al.
Published: (2018) -
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)