In the IT Consumerization phase, the organizations permit their employees to bring their personally owned device to workplace. This is achieved through enforcing policy or agreement - Bring Your Own Device. The BYOD policies adopted in numerous organizations are vague and generally immature. The prevailing security policies in BYOD are no more supportive for mobile devices like smartphones, tablets and laptops. The security policies must be modified to suit these devices. To mitigate this downside, 3-tier enhanced policy architecture is proposed which specifies the policies to be followed by the device, applications and organizations.
|Number of pages||6|
|Journal||Procedia Computer Science|
|Publication status||Published - 2015|
|Event||2nd International Symposium on Big Data and Cloud Computing Challenges, ISBCC 2015 - Chennai, India|
Duration: 12-03-2015 → 13-03-2015
All Science Journal Classification (ASJC) codes
- Computer Science(all)