Modifying security policies towards BYOD

U. Vignesh, S. Asha

Research output: Contribution to journalConference articlepeer-review

23 Citations (Scopus)

Abstract

In the IT Consumerization phase, the organizations permit their employees to bring their personally owned device to workplace. This is achieved through enforcing policy or agreement - Bring Your Own Device. The BYOD policies adopted in numerous organizations are vague and generally immature. The prevailing security policies in BYOD are no more supportive for mobile devices like smartphones, tablets and laptops. The security policies must be modified to suit these devices. To mitigate this downside, 3-tier enhanced policy architecture is proposed which specifies the policies to be followed by the device, applications and organizations.

Original languageEnglish
Pages (from-to)511-516
Number of pages6
JournalProcedia Computer Science
Volume50
DOIs
Publication statusPublished - 2015
Event2nd International Symposium on Big Data and Cloud Computing Challenges, ISBCC 2015 - Chennai, India
Duration: 12-03-201513-03-2015

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'Modifying security policies towards BYOD'. Together they form a unique fingerprint.

Cite this