Abstract
With the advent of BYOD (bring your own device) environment where personal mobile devices are used in work, companies began introducing NAC and MDM systems to prevent the leaks of, to access control and to efficiently manage confidential information. However, NAC and MDM access control policy is uniformly applied to users, and thus BYOD is not being actively introduced as of current where security threats exist as a result of frequent device loss and theft as well as low security level. Therefore, flexible policy setting and control method through personalized information collection are necessary. This study discusses the definition of context information and a method to collect the information to detect users’ abnormal behaviors considering the diversity of devices used and connection environments for BYOD.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Miller, K.W.: BYOD: security and privacy considerations. IT Prof. 14(5), 53–55 (2012)
Electronic Frontier Foundation: Panopticlick(browser fingerprint). https://panopticlick.eff.org/index.php?action=log&js=yes
Fyodor: Remote OS detection via TCP/IP stack fingerprinting, October 1998. http://www.insecure.org/nmap/nmap-fingerprinting-article.html
Smart, M.: Defeating TCP/IP stack fingerprinting. In: Proceedings of the 9th USENIX Security Symposium, August 2000
Virvilis N., Gritzalis D., Trusted computing vs. advanced persistent threats: can a defender win this game? In: Proceedings. of 10th IEEE International Conference on Autonomic and Trusted Computing, pp. 396–403, IEEE. Press, Italy (2013)
Singh, M., Patterh, M.S.: Formal specification of common criteria based access control policy model. Int. J. Netw. Secur. 10(3), 232–241 (2010)
Singh, M., Patterh, M.S., Kim, T.H.: A formal policy oriented access control model for secure enterprise network environment. Int. J. Secur. Appl. 3(2), 1–14 (2009)
Rhee, K., Jeon, W., Won, D.: Security requirements of a mobile device management system. Int. J. Secur. Appl. 6(2), 353–358 (2012)
Acknowledgments
This work was supported by the IT R&D program of MSIP/KEIT (Ministry of Science, ICT and Future Planning/Korea Evaluation Institute of Industrial Technology). [10045109, The Development of Context-Awareness based Dynamic Access Control Technology for BYOD, Smart work Environment].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kim, T., Noh, M., Chung, K., Im, C. (2015). A Study on Context Information Collection for Personal Mobile Device Identification in BYOD and Smart Work Environment. In: Giaffreda, R., Cagáňová, D., Li, Y., Riggio, R., Voisard, A. (eds) Internet of Things. IoT Infrastructures. IoT360 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 151. Springer, Cham. https://doi.org/10.1007/978-3-319-19743-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-19743-2_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19742-5
Online ISBN: 978-3-319-19743-2
eBook Packages: Computer ScienceComputer Science (R0)