首页> 美国政府科技报告 >T-dominance: Prioritized Defense Deployment for BYOD Security (Post Print)
【24h】

T-dominance: Prioritized Defense Deployment for BYOD Security (Post Print)

机译:T-dominance:BYOD security的优先防御部署(post print)

获取原文

摘要

Bring Your Own Device (BYOD) is an enterprise information technology (IT) policy that encourages employees to use their own devices to access sensitive corporate data at work through the enterprise IT infrastructure. Many current BYOD security practices are costly to implement and intrusive to employees, which, to some degree, negate BYOD's perceived benefits. To address such tension, we propose prioritized defense deployment: Instead of employing the same costly and intrusive security measures on each BYOD smartphone, more stringent threat detection/mitigation mechanisms are deployed on those representative smartphones, each of which represents, security-wise, a group of smartphones in the whole BYOD device pool. To this end, we propose a concept and a distributed algorithm, both named T-dominance, to capture the temporal- spatial pattern in an enterprise environment. We identify a few desirable properties of prioritized defense deployment, and analytically show that T- dominance satisfies such properties. We complement our analysis with simulations on real Wi-Fi association traces.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号