2015
DOI: 10.1007/978-3-319-15087-1_13
|View full text |Cite
|
Sign up to set email alerts
|

Context Based Smart Access Control on BYOD Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…This can be underpinned by GPS or a mobile network. Moreover, not only should information regarding physical locations be monitored and tracked, but rather contextual information (e.g., time-based, behavioral-based, and statistical-based information) should also be considered to control access [32]. Issues regarding privacy concerns may be raised, but monitoring and tracking systems can only be active during specific times, such as when a user borrows an organization-owned device for ad hoc work, or when a user is connecting to the corporate network using their BYOD device during working hours.…”
Section: Monitoring and Trackingmentioning
confidence: 99%
“…This can be underpinned by GPS or a mobile network. Moreover, not only should information regarding physical locations be monitored and tracked, but rather contextual information (e.g., time-based, behavioral-based, and statistical-based information) should also be considered to control access [32]. Issues regarding privacy concerns may be raised, but monitoring and tracking systems can only be active during specific times, such as when a user borrows an organization-owned device for ad hoc work, or when a user is connecting to the corporate network using their BYOD device during working hours.…”
Section: Monitoring and Trackingmentioning
confidence: 99%
“…However, this work identi ed some limitations in using clustering in building a device or device pro ling. e abnormal behaviour detection technique by Kang et al [11] uses contextual data of users having access to an enterprise network. e technique models a device's contextual data, such as the type of device used, access time, access location and time of use and builds a usage pa ern for detection of abnormal behaviours inside an enterprise network.…”
Section: Bring Your Own Device Enterprise Networkmentioning
confidence: 99%
“…gathering information about an a acker) but does not detect abnormal behaviour or a acks in a network. Whereas, the research approaches in [11,12,14,17] developed a behaviour proling techniques that builds a behaviour pro les from device usage, network characteristics and contextual network data to detect a pa ern(s) that deviates from the normal pro le and alert a network administrator. e novelty of BBOD is that it combines both the ngerprinting and behaviour pro ling approaches to identify, detect and block the abnormal device identi ed in a network.…”
Section: Device Typementioning
confidence: 99%
See 1 more Smart Citation
“…NAC, which performed control based on IP addresses, is not the basic solution even though it has added technologies like diversification of authentication of network access time point, management of harmful traffic after authentication, role-based control, and integrity check with increasingly popular cloud services [1][2][3][4][5][6][7][8][9][10].…”
Section: Related Work and Researchmentioning
confidence: 99%