A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
T-dominance: Prioritized defense deployment for BYOD security
2013
2013 IEEE Conference on Communications and Network Security (CNS)
Bring Your Own Device (BYOD) is an enterprise information technology (IT) policy that encourages employees to use their own devices to access sensitive corporate data at work through the enterprise IT infrastructure. Many current BYOD security practices are costly to implement and intrusive to employees, which, to some degree, negate BYOD's perceived benefits. To address such tension, we propose prioritized defense deployment: Instead of employing the same costly and intrusive security measures
doi:10.1109/cns.2013.6682690
dblp:conf/cns/PengLHZ013
fatcat:pom26nmew5b5pfv7f6sruvy5r4