A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System
Abstract
References
Index Terms
- A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System
Recommendations
An Application Restriction System for Bring-Your-Own-Device Scenarios
SACMAT '16: Proceedings of the 21st ACM on Symposium on Access Control Models and TechnologiesDifferent containerization techniques have been developed to ensure the separation of enterprise content and personal data on an end-user's device. Although the enterprise manages the environment in which work-related activities are conducted, referred ...
Today's Mobile Security Requires a New Approach
Companies are looking for new ways to secure their data and networks now that many employees are using their own mobile devices in the workplace.
Enhancing Android permission through usage control: a BYOD use-case
SAC '16: Proceedings of the 31st Annual ACM Symposium on Applied ComputingThe Bring Your Own Device (BYOD) paradigm, where the employees of a company install an application on their mobile devices to access company privileged information, is becoming very popular in the business environment. In order to perform their tasks, ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Ziming Zhao,
- Gail-Joon Ahn,
- Program Chairs:
- Ram Krishnan,
- Gabriel Ghinita
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 133Total Downloads
- Downloads (Last 12 months)7
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in