[go: up one dir, main page]

Hasan, 2019 - Google Patents

A conceptual framework for mobile security supporting enterprises in adopting mobility

Hasan, 2019

View PDF
Document ID
11997157331495723331
Author
Hasan B
Publication year

External Links

Snippet

Integrating mobile devices, namely smartphones and tablets, into the enterprise gives the employees the ability to work more productively. However, this integration has also brought new security challenges and risks. Despite all the advantages of mobility, many enterprises …
Continue reading at oops.uni-oldenburg.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • H04M1/72563Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances
    • H04M1/72572Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances according to a geographic location
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/26Devices for signalling identity of wanted subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, i.e. memories whose operation does not require relative movement between storage means and a transducer, e.g. chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
Ansari et al. STORE: Security threat oriented requirements engineering methodology
Weichbroth et al. Mobile security: Threats and best practices
Süren et al. PatrIoT: practical and agile threat research for IoT
Patel et al. A novel methodology towards a trusted environment in mashup web applications
Folk et al. The security implications of the Internet of Things
Sakshi et al. A survey on blockchain based IoT forensic evidence preservation: research trends and current challenges
Rasner Cybersecurity and third-party risk: Third party threat hunting
Hettiarachchige et al. Holistic authentication framework for virtual agents; UK banking industry
Reichert et al. Software supply chain security: a systematic literature review
Hardjono et al. MIT Open Algorithms
Zahadat Mobile security: A systems engineering framework for implementing bring your own device (BYOD) security through the combination of policy management and technology
Hasan A conceptual framework for mobile security supporting enterprises in adopting mobility
Nguyen et al. IBM MobileFirst in Action for mGovernment and Citizen Mobile Services
Rah Device Management in the Security of “Bring Your Own Device”(BYOD) for the Post-pandemic, Remote Workplace
García et al. Digital onboarding in finance: a novel model and related cybersecurity risks
Madan et al. Securely adopting mobile technology innovations for your enterprise using ibm security solutions
Yevseyeva et al. Addressing consumerization of IT risks with nudging
Moore A Zero Trust Approach to Fundamentally Redesign Network Architecture within Federal Agencies
Szczepanik et al. Security of mobile banking applications
Kaya Trust and security risks in mobile banking
Rübsamen et al. Evidence for accountable cloud computing services
Boda Exploring Software as a Service Security Architecture Challenges and Considerations
Schaller Combine DLP and EDRM to enable automatized and secure information sharing
Yerukhimovich et al. Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices
Hasan et al. Security framework for adopting mobile applications in small and medium enterprises