THERMAL SCIENCE

International Scientific Journal

Authors of this Paper

External Links

MANAGING ACCESS CONTROL ISSUES IN THE CHOOSE YOUR OWN DEVICE ENVIRONMENT

ABSTRACT
Enterprise mobility is taking the business to another level. Organizations are nowadays managing to adopt varying enterprise mobility that helps run the transactions conducted in a bigger and better way. Despite their huge assistance, most enterprise mobilities are causing mayhem to most organizations that have integrated them as the sole strategy to keep things running. They are becoming inevitable and unstoppable trends that pose new security risks and challenges in controlling and managing corporate data and networks. If not well monitored, they can unwontedly lead to disclosing vital information, disruption of services, legal implications, financial issues, loss of productivity, and modify access policies. One such largely implemented enterprise mobility is choose your own de-vice. The intention of this paper is to propose a new framework that would help in managing the access control issues in the environment of choose your own device. The main aim of the proposed architecture is to reduce restrictions and enforce access control policies in choose your own device and the cloud.
KEYWORDS
PAPER SUBMITTED: 2022-10-08
PAPER REVISED: 2022-11-20
PAPER ACCEPTED: 2022-11-27
PUBLISHED ONLINE: 2023-01-21
DOI REFERENCE: https://doi.org/10.2298/TSCI22S1445A
CITATION EXPORT: view in browser or download as text file
THERMAL SCIENCE YEAR 2022, VOLUME 26, ISSUE Special issue 1, PAGES [445 - 455]
REFERENCES
  1. Basole, R. C., Enterprise Mobility: Researching a New Paradigm. Information, Knowledge Systems Management, 7 (2008), 1-2, pp. 1-7
  2. Loh, C. C., et al., Enterprise Mobility and Support Outsourcing: A Research Model and Initial Findings, Information Knowledge Systems Management, 7 (2008), 1-2, pp. 183-210
  3. Norris, B., The Benefits of CYOD and BYOD: 3 Reasons to Consider Employee Choice, Shi.com, 2022
  4. Servos, D., Osborn, S. L., Current Research and Open Problems in Attribute-Based Access Control, ACM Computing Surveys (CSUR), 49 (2017), 4, pp. 1-45
  5. Hein, D., BYOD vs. CYOD vs. COPE: What's the Difference?, Mobility Manag. Solutions Review, 2019
  6. Brodin, M., BYOD vs. CYOD," What is the difference?, Proceedings, 9th IADIS International Confer-ence Information Systems, Vilamoura, Portugal , pp. 55-62, 2016
  7. Zambrano, F. R. R., Rafael, G. D. R., Bring Your Own Device (BYOD): a Survey of Threats and Securi-ty Management Models, International Journal of Electronic Business, 14 (2018), 2, pp. 146-170
  8. French, A. M., et al., Current Status, Issues, and Future of Bring Your Own Device (BYOD), Commu-nications of the Association for Information Systems, 35 (2014), 1, 10
  9. Ouaddah, A., et al., Access Control in the Internet of Things: Big Challenges and New Opportunities, Computer Networks, 112 (2017), Jan., pp. 237-262
  10. Abomhara, M., Koien, G. M., Cyber Security and the Internet of Things: Vulnerabilities, Threats, In-truders and Attacks, Journal of Cyber Security and Mobility, 4 (2015), 1, pp. 65-88, 2015
  11. Iovan, S., Ivanus, C., Bring Your Own Device (BYOD) vs. Choose Your Own Device (CYOD), Annals of Constantin Brancusi University of Targu-Jiu. Engineering Series, vol. 4, pp. 112-117, 2018
  12. Kokolakis, S., et al., Information Systems in a Changing Economy and Society, Proceedings, MCIS2015, pp. 38-511, 2016
  13. Zambrano, F. R. R., Rafael, G. D. R., Bring Your Own Device (BYOD): A Survey of Threats and Secu-rity Management Models, International Journal of Electronic Business, 14 (2018), 2, pp. 146-170
  14. Ratchford, M., et al., BYOD Security Issues: A Systematic Literature Review, Information Security Journal: A Global Perspective, 31 (2022), 3, pp. 253-273
  15. Akram, R. N., Markantonakis, K., Challenges of Security and Trust of Mobile Devices as Digital Avion-ics Component, Proceedings, Integrated Communications Navigation and Surveillance, Herndon, Va., USA, pp. 1C4-1, 2016
  16. Raj, U., Certificate Based Hybrid Authentication for Bring Your Own Device (BYOD) in Wi-Fi Enabled Environment, Int. Journal of Computer Science and Information Security, 13 (2015), 12, pp. 41-47
  17. Liu, C.-H., et al., The Enhancement of Security in Healthcare Information Systems, Journal of medical systems, 36 (2012), 3, pp. 1673-1688
  18. Zhang, Y., et al., Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control, IEEE Internet of Things Journal, 5 (2018), 3, pp. 2130-2145
  19. Sarkar, K. R., Assessing Insider Threats to Information Security Using Technical, Behavioural and Organisational Measures, Information Security Technical Report, 15 (2010), 3, pp. 112-133
  20. Garba, A. B., et al., Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments, Journal of Information Privacy and Security, 11 (2015), 1, pp. 38-54

© 2024 Society of Thermal Engineers of Serbia. Published by the Vinča Institute of Nuclear Sciences, National Institute of the Republic of Serbia, Belgrade, Serbia. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 International licence