Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2989052
|View full text |Cite
|
Sign up to set email alerts
|

Poster

Abstract: Smartphones are becoming the main data sharing and storage devices in both our personal and professional lives, as companies now allow employees to share the same device for both purposes, provided the company's confidential information can be protected. However, as history has shown, systems relying on security policies or rules to protect user data are not airtight. Any flaw in the constructed rules or in the code of privileged applications can lead to complete compromise. In addition, we can not rely only o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 2 publications
0
0
0
Order By: Relevance