Skip to main content
Top

2017 | OriginalPaper | Chapter

BYODCert: Toward a Cross-Organizational BYOD Paradigm

Author : Alessio Merlo

Published in: Green, Pervasive, and Cloud Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We introduce a novel architectural solution (BYODCert) for managing the Bring Your Own Device paradigm at a cross-organizational level by exploiting mobile device certifications. BYODCert acts as a trusted third party allowing organizations to verify the compliance of their employees’ personal devices against BYOD security policies. BYODCert is implemented as a cloud service that can be adopted by organizations as an external and on-demand BYOD solution.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones, mitigation techniques. IEEE Commun. Surv. Tutor. 17(1), 334–357 (2015). FirstquarterCrossRef Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones, mitigation techniques. IEEE Commun. Surv. Tutor. 17(1), 334–357 (2015). FirstquarterCrossRef
8.
go back to reference Clarke, E.M., Emerson, E.A., Sistla, A.P.: Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8(2), 244–263 (1986)CrossRefMATH Clarke, E.M., Emerson, E.A., Sistla, A.P.: Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8(2), 244–263 (1986)CrossRefMATH
10.
go back to reference Desmet, L., Joosen, W., Massacci, F., Naliuka, K., Philippaerts, P., Piessens, F., Vanoverberghe, D.: The s3ms.net run time monitor. Electron. Notes Theor. Comput. Sci. 253(5), 153–159 (2009)CrossRef Desmet, L., Joosen, W., Massacci, F., Naliuka, K., Philippaerts, P., Piessens, F., Vanoverberghe, D.: The s3ms.net run time monitor. Electron. Notes Theor. Comput. Sci. 253(5), 153–159 (2009)CrossRef
11.
go back to reference Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015). Cited by 7CrossRef Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015). Cited by 7CrossRef
12.
go back to reference Bielova, N., Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I.: Matching in security-by-contract for mobile code. J. Log. Algebr. Program. 78(5), 340–358 (2009). The 1st Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS07)CrossRefMATH Bielova, N., Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I.: Matching in security-by-contract for mobile code. J. Log. Algebr. Program. 78(5), 340–358 (2009). The 1st Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS07)CrossRefMATH
13.
go back to reference Armando, A., Costa, G., Merlo, A.: Bring your own device, securely. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC 2013, pp. 1852–1858. ACM, New York (2013) Armando, A., Costa, G., Merlo, A.: Bring your own device, securely. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC 2013, pp. 1852–1858. ACM, New York (2013)
14.
go back to reference Armando, A., Costa, G., Verderame, L., Merlo, A.: Securing the bring your own device paradigm. Computer 47(6), 48–56 (2014)CrossRef Armando, A., Costa, G., Verderame, L., Merlo, A.: Securing the bring your own device paradigm. Computer 47(6), 48–56 (2014)CrossRef
15.
go back to reference Armando, A., Costa, G., Merlo, A., Verderame, L.: Enabling BYOD through secure meta-market. In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014, pp. 219–230. ACM, New York (2014) Armando, A., Costa, G., Merlo, A., Verderame, L.: Enabling BYOD through secure meta-market. In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014, pp. 219–230. ACM, New York (2014)
17.
go back to reference Falcone, Y., Currea, S., Jaber, M.: Runtime verification and enforcement for android applications with RV-Droid. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 88–95. Springer, Heidelberg (2013). doi:10.1007/978-3-642-35632-2_11 CrossRef Falcone, Y., Currea, S., Jaber, M.: Runtime verification and enforcement for android applications with RV-Droid. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 88–95. Springer, Heidelberg (2013). doi:10.​1007/​978-3-642-35632-2_​11 CrossRef
18.
go back to reference Merlo, A.: Secure cooperative access control on grid. Future Gener. Comput. Syst. 29(2), 497–508 (2013). Special section: recent advances in e-ScienceCrossRef Merlo, A.: Secure cooperative access control on grid. Future Gener. Comput. Syst. 29(2), 497–508 (2013). Special section: recent advances in e-ScienceCrossRef
19.
20.
go back to reference Holzmann, G.: Spin Model Checker, the: Primer and Reference Manual, 1st edn. Addison-Wesley Professional, Boston (2003) Holzmann, G.: Spin Model Checker, the: Primer and Reference Manual, 1st edn. Addison-Wesley Professional, Boston (2003)
21.
go back to reference Cranen, S., Groote, J.F., Keiren, J.J.A., Stappers, F.P.M., de Vink, E.P., Wesselink, W., Willemse, T.A.C.: An overview of the mCRL2 toolset and its recent advances. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013. LNCS, vol. 7795, pp. 199–213. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36742-7_15 CrossRef Cranen, S., Groote, J.F., Keiren, J.J.A., Stappers, F.P.M., de Vink, E.P., Wesselink, W., Willemse, T.A.C.: An overview of the mCRL2 toolset and its recent advances. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013. LNCS, vol. 7795, pp. 199–213. Springer, Heidelberg (2013). doi:10.​1007/​978-3-642-36742-7_​15 CrossRef
22.
go back to reference Andersen, H.R.: Partial model checking. In: Proceedings of Tenth Annual IEEE Symposium on Logic in Computer Science, pp. 398–407, June 1995 Andersen, H.R.: Partial model checking. In: Proceedings of Tenth Annual IEEE Symposium on Logic in Computer Science, pp. 398–407, June 1995
23.
go back to reference Cremers, C.J.F.: The Scyther Tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70545-1_38 CrossRef Cremers, C.J.F.: The Scyther Tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). doi:10.​1007/​978-3-540-70545-1_​38 CrossRef
24.
go back to reference Caviglione, L.: Can satellites face trends? the case of web 2.0. In: International Workshop on Satellite and Space Communications, pp. 446–450, September 2009 Caviglione, L.: Can satellites face trends? the case of web 2.0. In: International Workshop on Satellite and Space Communications, pp. 446–450, September 2009
Metadata
Title
BYODCert: Toward a Cross-Organizational BYOD Paradigm
Author
Alessio Merlo
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-57186-7_52

Premium Partner