Purpose\ud
The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets.\ud
Design/methodology/approach\ud
OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and opportunities. Moreover, it is based on a mobile client – server architecture, where the OPPRIM application running on the user device interacts with the company IT security server to manage every access request to corporate assets.\ud
Findings\ud
As a mandatory requirement in the highly flexible BYOD setting, in the OPPRIM approach, mobile device security risks are identified automatically and dynamically depending on the specific environment in which the access request is issued and on the previous history of events.\ud
Originality/value\ud
The main novelty of the OPPRIM approach is the combined treatment of threats (resp., opportunities) and costs (resp., benefits) in a trust-based setting. The OPPRIM system is validated with respect to an economic perspective: cost-benefit sensitivity analysis is conducted through formal methods using the PRISM model checker and through agent-based simulations using the Anylogic framework
There is some concern regarding the effect of smart phones and other wearable devices using wireless communication and worn by the users very closely to their body. In this paper, we propose a new network switching selection model and its algorithms that minimize the non-ionizing radiation of these devices during use. We validate the model and its algorithms with a proof-of-concept implementation on the Android platform.
During the last few years the amount of users with mobile devices (laptops, smartphones, tablets, etc.) with wireless connectivity capabilities has grown at an impressive rate. In the meantime, the number of Wi-Fi networks has also increased a lot, and in addition to this, the emergence and fast growth of applications such as social networking, user generated content, location services, collaborative tools and applications, etc. has fueled the user's need for permanent connectivity. This paper introduces Flexible Communication, a secure and trust-based Wi-Fi password sharing service. Our service architecture provides the user with a solution that enables free Wi-Fi network password sharing, which relies on a social-networking oriented trust model approach and which at the same time allows the user to locate and to connect to those Wi-Fi networks at any time. We validate our solution with a qualitative assessment which compares its features against those of the other similar existent solutions and also with a quantitative assessment which measures the performance both of the server and the client.
Abstract-With the advent of the Bring-Your-Own-Device (BYOD) trend, mobile work is achieving a widespread diffusion that challenges the traditional view of security standard and risk management. A recently proposed model, called opportunity-enabled risk management (OPPRIM), aims at balancing the analysis of the major threats that arise in the BYOD setting with the analysis of the potential increased opportunities emerging in such an environment, by combining mechanisms of risk estimation with trust and threat metrics. Firstly, this paper provides a logic-based formalization of the policy and metric specification paradigm of OPPRIM. Secondly, we verify the OPPRIM model with respect to the socio-economic perspective. More precisely, this is validated formally by employing toolsupported quantitative model checking techniques.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.