Skip to main content

A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era

  • Conference paper
Grid and Pervasive Computing (GPC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7861))

Included in the following conference series:

Abstract

The BYOD (Bring Your Own Device) based mobile office services become popular as the rapid growth of smartphone users. However, malicious codes are also widespread, therefore security threats become serious problems. This paper suggests WLSA (White-List based Security Architecture) for the better mobile office security and presents required procedures and the analysis of the expected security enhancement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Miller, K.W., Voas, J., Hurlburt, G.F.: BYOD: Security and Privacy Considerations. IT Professional 14(5), 53–55 (2012)

    Article  Google Scholar 

  2. Shankar, S.: As BYOD caches on, IT sector gets ready for 1M malicious apps (December 25, 2012), mydigitalfc.com

  3. http://play.google.com

  4. Lee, K., Tolentino, R.S., Park, G.-C., Kim, Y.-T.: A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment. In: Kim, T.-h., Chang, A.C.-C., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds.) FGCN 2010. CCIS, vol. 119, pp. 155–163. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Stueckle, J.D.: Android Protectoin System: A Signed Code Security Mechanism for Smartphone Applications, Air force institute of technology, Thesis (March 2011)

    Google Scholar 

  6. Kim, K.Y., Kang, D.H.: Smart Phone Security Technology in Opened Mobile Environment. Korea Institute of Information Security & Cryptology 19(5) (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, J., Lee, Y., Kim, SC. (2013). A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era. In: Park, J.J.(.H., Arabnia, H.R., Kim, C., Shi, W., Gil, JM. (eds) Grid and Pervasive Computing. GPC 2013. Lecture Notes in Computer Science, vol 7861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38027-3_98

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38027-3_98

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38026-6

  • Online ISBN: 978-3-642-38027-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics