Abstract
We introduce a novel architectural solution (BYODCert) for managing the Bring Your Own Device paradigm at a cross-organizational level by exploiting mobile device certifications. BYODCert acts as a trusted third party allowing organizations to verify the compliance of their employees’ personal devices against BYOD security policies. BYODCert is implemented as a cloud service that can be adopted by organizations as an external and on-demand BYOD solution.
References
Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones, mitigation techniques. IEEE Commun. Surv. Tutor. 17(1), 334–357 (2015). Firstquarter
Aktug, I., Naliuka, K.: Conspec: a formal language for policy specification. Sci. Comput. Program. 74(1), 2–12 (2008)
Ibm byod solution. http://www.ibm.com/mobile/bring-your-own-device/. Accessed 7 Mar 2017
Blackberry byod solution. http://us.blackberry.com/bring-your-own-device. Accessed 7 Mar 2017
Appthority. https://www.appthority.com. Accessed 7 Mar 2017
Huawei byod solution. http://enterprise.huawei.com/topic/byod_en/. Accessed 7 Mar 2017
Kozen, D.: Results on the propositional-calculus. Theor. Comput. Sci. 27(3), 333–354 (1983)
Clarke, E.M., Emerson, E.A., Sistla, A.P.: Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8(2), 244–263 (1986)
King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385–394 (1976)
Desmet, L., Joosen, W., Massacci, F., Naliuka, K., Philippaerts, P., Piessens, F., Vanoverberghe, D.: The s3ms.net run time monitor. Electron. Notes Theor. Comput. Sci. 253(5), 153–159 (2009)
Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015). Cited by 7
Bielova, N., Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I.: Matching in security-by-contract for mobile code. J. Log. Algebr. Program. 78(5), 340–358 (2009). The 1st Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS07)
Armando, A., Costa, G., Merlo, A.: Bring your own device, securely. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC 2013, pp. 1852–1858. ACM, New York (2013)
Armando, A., Costa, G., Verderame, L., Merlo, A.: Securing the bring your own device paradigm. Computer 47(6), 48–56 (2014)
Armando, A., Costa, G., Merlo, A., Verderame, L.: Enabling BYOD through secure meta-market. In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014, pp. 219–230. ACM, New York (2014)
Costa, G., Merlo, A., Verderame, L., Armando, A.: Automatic security verification of mobile app configurations. Future Gener. Comput. Syst. (2016). http://dx.doi.org/10.1016/j.future.2016.06.014
Falcone, Y., Currea, S., Jaber, M.: Runtime verification and enforcement for android applications with RV-Droid. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 88–95. Springer, Heidelberg (2013). doi:10.1007/978-3-642-35632-2_11
Merlo, A.: Secure cooperative access control on grid. Future Gener. Comput. Syst. 29(2), 497–508 (2013). Special section: recent advances in e-Science
Bartoletti, M., Degano, P., Ferrari, G.L.: History-based access control with local policies. In: Sassone, V. (ed.) FoSSaCS 2005. LNCS, vol. 3441, pp. 316–332. Springer, Heidelberg (2005). doi:10.1007/978-3-540-31982-5_20
Holzmann, G.: Spin Model Checker, the: Primer and Reference Manual, 1st edn. Addison-Wesley Professional, Boston (2003)
Cranen, S., Groote, J.F., Keiren, J.J.A., Stappers, F.P.M., de Vink, E.P., Wesselink, W., Willemse, T.A.C.: An overview of the mCRL2 toolset and its recent advances. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013. LNCS, vol. 7795, pp. 199–213. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36742-7_15
Andersen, H.R.: Partial model checking. In: Proceedings of Tenth Annual IEEE Symposium on Logic in Computer Science, pp. 398–407, June 1995
Cremers, C.J.F.: The Scyther Tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70545-1_38
Caviglione, L.: Can satellites face trends? the case of web 2.0. In: International Workshop on Satellite and Space Communications, pp. 446–450, September 2009
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Merlo, A. (2017). BYODCert: Toward a Cross-Organizational BYOD Paradigm. In: Au, M., Castiglione, A., Choo, KK., Palmieri, F., Li, KC. (eds) Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science(), vol 10232. Springer, Cham. https://doi.org/10.1007/978-3-319-57186-7_52
Download citation
DOI: https://doi.org/10.1007/978-3-319-57186-7_52
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57185-0
Online ISBN: 978-3-319-57186-7
eBook Packages: Computer ScienceComputer Science (R0)