Abstract
The BYOD (Bring Your Own Device) based mobile office services become popular as the rapid growth of smartphone users. However, malicious codes are also widespread, therefore security threats become serious problems. This paper suggests WLSA (White-List based Security Architecture) for the better mobile office security and presents required procedures and the analysis of the expected security enhancement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Miller, K.W., Voas, J., Hurlburt, G.F.: BYOD: Security and Privacy Considerations. IT Professional 14(5), 53–55 (2012)
Shankar, S.: As BYOD caches on, IT sector gets ready for 1M malicious apps (December 25, 2012), mydigitalfc.com
Lee, K., Tolentino, R.S., Park, G.-C., Kim, Y.-T.: A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment. In: Kim, T.-h., Chang, A.C.-C., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds.) FGCN 2010. CCIS, vol. 119, pp. 155–163. Springer, Heidelberg (2010)
Stueckle, J.D.: Android Protectoin System: A Signed Code Security Mechanism for Smartphone Applications, Air force institute of technology, Thesis (March 2011)
Kim, K.Y., Kang, D.H.: Smart Phone Security Technology in Opened Mobile Environment. Korea Institute of Information Security & Cryptology 19(5) (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, J., Lee, Y., Kim, SC. (2013). A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era. In: Park, J.J.(.H., Arabnia, H.R., Kim, C., Shi, W., Gil, JM. (eds) Grid and Pervasive Computing. GPC 2013. Lecture Notes in Computer Science, vol 7861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38027-3_98
Download citation
DOI: https://doi.org/10.1007/978-3-642-38027-3_98
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38026-6
Online ISBN: 978-3-642-38027-3
eBook Packages: Computer ScienceComputer Science (R0)