Sean Chung, S. Chung, T. Escrig, Yan Bai, B. Endicott-Popovsky
{"title":"2TAC:“自带设备”安全的分布式访问控制架构","authors":"Sean Chung, S. Chung, T. Escrig, Yan Bai, B. Endicott-Popovsky","doi":"10.1109/BIOMEDCOM.2012.26","DOIUrl":null,"url":null,"abstract":"Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop \"Bring Your Own Device\" policies to allow their employees to use their devices in the workplace. However, due to emerging attacks and limitations in device resources, it is difficult to trust these devices with access to critical proprietary information. To mitigate this problem we propose a novel architecture called 2-Tier Access Control (2TAC), which uses double layer access control along with device security profiles, anti-virus/malware scanners, and social networking.","PeriodicalId":146495,"journal":{"name":"2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"2TAC: Distributed Access Control Architecture for \\\"Bring Your Own Device\\\" Security\",\"authors\":\"Sean Chung, S. Chung, T. Escrig, Yan Bai, B. Endicott-Popovsky\",\"doi\":\"10.1109/BIOMEDCOM.2012.26\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop \\\"Bring Your Own Device\\\" policies to allow their employees to use their devices in the workplace. However, due to emerging attacks and limitations in device resources, it is difficult to trust these devices with access to critical proprietary information. To mitigate this problem we propose a novel architecture called 2-Tier Access Control (2TAC), which uses double layer access control along with device security profiles, anti-virus/malware scanners, and social networking.\",\"PeriodicalId\":146495,\"journal\":{\"name\":\"2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BIOMEDCOM.2012.26\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BIOMEDCOM.2012.26","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
2TAC: Distributed Access Control Architecture for "Bring Your Own Device" Security
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop "Bring Your Own Device" policies to allow their employees to use their devices in the workplace. However, due to emerging attacks and limitations in device resources, it is difficult to trust these devices with access to critical proprietary information. To mitigate this problem we propose a novel architecture called 2-Tier Access Control (2TAC), which uses double layer access control along with device security profiles, anti-virus/malware scanners, and social networking.