Research Article
Enforcing Security Policies in Mobile Devices Using Multiple Personas
449 downloads
@INPROCEEDINGS{10.1007/978-3-642-29154-8_25, author={Akhilesh Gupta and Anupam Joshi and Gopal Pingali}, title={Enforcing Security Policies in Mobile Devices Using Multiple Personas}, proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers}, proceedings_a={MOBIQUITOUS}, year={2012}, month={10}, keywords={}, doi={10.1007/978-3-642-29154-8_25} }
- Akhilesh Gupta
Anupam Joshi
Gopal Pingali
Year: 2012
Enforcing Security Policies in Mobile Devices Using Multiple Personas
MOBIQUITOUS
Springer
DOI: 10.1007/978-3-642-29154-8_25
Abstract
Cell phones are becoming increasingly more sophisticated, and such ”Smart” phones are a growing front end to access the web and internet applications. They are often used in a multiple modes – for instance for both personal and business purposes. Enterprises that allow employees to use the phones in this dual mode need to protect the information and applications on such devices and control their behavior. This paper describes an approach that integrates declarative policies, context and OS level device control to enforce security by creating multiple personas for the device. We describe the approach, and present a proof of concept implementation on Android.
Copyright © 2010–2024 ICST