Hasan, 2019 - Google Patents
A conceptual framework for mobile security supporting enterprises in adopting mobilityHasan, 2019
View PDF- Document ID
- 11997157331495723331
- Author
- Hasan B
- Publication year
External Links
Snippet
Integrating mobile devices, namely smartphones and tablets, into the enterprise gives the employees the ability to work more productively. However, this integration has also brought new security challenges and risks. Despite all the advantages of mobility, many enterprises …
- 238000011160 research 0 description 139
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72563—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances
- H04M1/72572—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances according to a geographic location
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/26—Devices for signalling identity of wanted subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, i.e. memories whose operation does not require relative movement between storage means and a transducer, e.g. chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ansari et al. | STORE: Security threat oriented requirements engineering methodology | |
| Weichbroth et al. | Mobile security: Threats and best practices | |
| Süren et al. | PatrIoT: practical and agile threat research for IoT | |
| Patel et al. | A novel methodology towards a trusted environment in mashup web applications | |
| Folk et al. | The security implications of the Internet of Things | |
| Sakshi et al. | A survey on blockchain based IoT forensic evidence preservation: research trends and current challenges | |
| Rasner | Cybersecurity and third-party risk: Third party threat hunting | |
| Hettiarachchige et al. | Holistic authentication framework for virtual agents; UK banking industry | |
| Reichert et al. | Software supply chain security: a systematic literature review | |
| Hardjono et al. | MIT Open Algorithms | |
| Zahadat | Mobile security: A systems engineering framework for implementing bring your own device (BYOD) security through the combination of policy management and technology | |
| Hasan | A conceptual framework for mobile security supporting enterprises in adopting mobility | |
| Nguyen et al. | IBM MobileFirst in Action for mGovernment and Citizen Mobile Services | |
| Rah | Device Management in the Security of “Bring Your Own Device”(BYOD) for the Post-pandemic, Remote Workplace | |
| García et al. | Digital onboarding in finance: a novel model and related cybersecurity risks | |
| Madan et al. | Securely adopting mobile technology innovations for your enterprise using ibm security solutions | |
| Yevseyeva et al. | Addressing consumerization of IT risks with nudging | |
| Moore | A Zero Trust Approach to Fundamentally Redesign Network Architecture within Federal Agencies | |
| Szczepanik et al. | Security of mobile banking applications | |
| Kaya | Trust and security risks in mobile banking | |
| Rübsamen et al. | Evidence for accountable cloud computing services | |
| Boda | Exploring Software as a Service Security Architecture Challenges and Considerations | |
| Schaller | Combine DLP and EDRM to enable automatized and secure information sharing | |
| Yerukhimovich et al. | Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices | |
| Hasan et al. | Security framework for adopting mobile applications in small and medium enterprises |