Modifying security policies towards byod procedia computer science

In the IT Consumerization phase, the organizations permit their employees to bring their personally owned device to workplace. This is achieved through enforcing policy or agreement - Bring Your Own Device. The BYOD policies adopted in numerous organizations are vague and generally immature. The prevailing security policies in BYOD are no more supportive for mobile devices like smartphones, tablets and laptops. The security policies must be modified to suit these devices. To mitigate this downside, 3-tier enhanced policy architecture is proposed which specifies the policies to be followed by the device, applications and organizations.

Identifiers

journal ISSN : 1877-0509
DOI 10.1016/j.procs.2015.04.023

Authors

User assignment

Assignment remove confirmation

You're going to remove this assignment. Are you sure?

U. Vignesh

S. Asha

Keywords

Additional information

Publication languages: English

Data set: Elsevier

Publisher

Elsevier Science

Fields of science

No field of science has been suggested yet.