THERMAL SCIENCE
International Scientific Journal
MANAGING ACCESS CONTROL ISSUES IN THE CHOOSE YOUR OWN DEVICE ENVIRONMENT
ABSTRACT
Enterprise mobility is taking the business to another level. Organizations are nowadays managing to adopt varying enterprise mobility that helps run the transactions conducted in a bigger and better way. Despite their huge assistance, most enterprise mobilities are causing mayhem to most organizations that have integrated them as the sole strategy to keep things running. They are becoming inevitable and unstoppable trends that pose new security risks and challenges in controlling and managing corporate data and networks. If not well monitored, they can unwontedly lead to disclosing vital information, disruption of services, legal implications, financial issues, loss of productivity, and modify access policies. One such largely implemented enterprise mobility is choose your own de-vice. The intention of this paper is to propose a new framework that would help in managing the access control issues in the environment of choose your own device. The main aim of the proposed architecture is to reduce restrictions and enforce access control policies in choose your own device and the cloud.
KEYWORDS
PAPER SUBMITTED: 2022-10-08
PAPER REVISED: 2022-11-20
PAPER ACCEPTED: 2022-11-27
PUBLISHED ONLINE: 2023-01-21
- Basole, R. C., Enterprise Mobility: Researching a New Paradigm. Information, Knowledge Systems Management, 7 (2008), 1-2, pp. 1-7
- Loh, C. C., et al., Enterprise Mobility and Support Outsourcing: A Research Model and Initial Findings, Information Knowledge Systems Management, 7 (2008), 1-2, pp. 183-210
- Norris, B., The Benefits of CYOD and BYOD: 3 Reasons to Consider Employee Choice, Shi.com, 2022
- Servos, D., Osborn, S. L., Current Research and Open Problems in Attribute-Based Access Control, ACM Computing Surveys (CSUR), 49 (2017), 4, pp. 1-45
- Hein, D., BYOD vs. CYOD vs. COPE: What's the Difference?, Mobility Manag. Solutions Review, 2019
- Brodin, M., BYOD vs. CYOD," What is the difference?, Proceedings, 9th IADIS International Confer-ence Information Systems, Vilamoura, Portugal , pp. 55-62, 2016
- Zambrano, F. R. R., Rafael, G. D. R., Bring Your Own Device (BYOD): a Survey of Threats and Securi-ty Management Models, International Journal of Electronic Business, 14 (2018), 2, pp. 146-170
- French, A. M., et al., Current Status, Issues, and Future of Bring Your Own Device (BYOD), Commu-nications of the Association for Information Systems, 35 (2014), 1, 10
- Ouaddah, A., et al., Access Control in the Internet of Things: Big Challenges and New Opportunities, Computer Networks, 112 (2017), Jan., pp. 237-262
- Abomhara, M., Koien, G. M., Cyber Security and the Internet of Things: Vulnerabilities, Threats, In-truders and Attacks, Journal of Cyber Security and Mobility, 4 (2015), 1, pp. 65-88, 2015
- Iovan, S., Ivanus, C., Bring Your Own Device (BYOD) vs. Choose Your Own Device (CYOD), Annals of Constantin Brancusi University of Targu-Jiu. Engineering Series, vol. 4, pp. 112-117, 2018
- Kokolakis, S., et al., Information Systems in a Changing Economy and Society, Proceedings, MCIS2015, pp. 38-511, 2016
- Zambrano, F. R. R., Rafael, G. D. R., Bring Your Own Device (BYOD): A Survey of Threats and Secu-rity Management Models, International Journal of Electronic Business, 14 (2018), 2, pp. 146-170
- Ratchford, M., et al., BYOD Security Issues: A Systematic Literature Review, Information Security Journal: A Global Perspective, 31 (2022), 3, pp. 253-273
- Akram, R. N., Markantonakis, K., Challenges of Security and Trust of Mobile Devices as Digital Avion-ics Component, Proceedings, Integrated Communications Navigation and Surveillance, Herndon, Va., USA, pp. 1C4-1, 2016
- Raj, U., Certificate Based Hybrid Authentication for Bring Your Own Device (BYOD) in Wi-Fi Enabled Environment, Int. Journal of Computer Science and Information Security, 13 (2015), 12, pp. 41-47
- Liu, C.-H., et al., The Enhancement of Security in Healthcare Information Systems, Journal of medical systems, 36 (2012), 3, pp. 1673-1688
- Zhang, Y., et al., Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control, IEEE Internet of Things Journal, 5 (2018), 3, pp. 2130-2145
- Sarkar, K. R., Assessing Insider Threats to Information Security Using Technical, Behavioural and Organisational Measures, Information Security Technical Report, 15 (2010), 3, pp. 112-133
- Garba, A. B., et al., Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments, Journal of Information Privacy and Security, 11 (2015), 1, pp. 38-54