Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers

Research Article

Enforcing Security Policies in Mobile Devices Using Multiple Personas

Download
415 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29154-8_25,
        author={Akhilesh Gupta and Anupam Joshi and Gopal Pingali},
        title={Enforcing Security Policies in Mobile Devices Using Multiple Personas},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2012},
        month={10},
        keywords={},
        doi={10.1007/978-3-642-29154-8_25}
    }
    
  • Akhilesh Gupta
    Anupam Joshi
    Gopal Pingali
    Year: 2012
    Enforcing Security Policies in Mobile Devices Using Multiple Personas
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-642-29154-8_25
Akhilesh Gupta,*, Anupam Joshi,*, Gopal Pingali1,*
  • 1: IBM Research - India
*Contact email: akhilesh.iitdelhi@gmail.com, anupam.joshi@in.ibm.com, gpingali@us.ibm.com

Abstract

Cell phones are becoming increasingly more sophisticated, and such ”Smart” phones are a growing front end to access the web and internet applications. They are often used in a multiple modes – for instance for both personal and business purposes. Enterprises that allow employees to use the phones in this dual mode need to protect the information and applications on such devices and control their behavior. This paper describes an approach that integrates declarative policies, context and OS level device control to enforce security by creating multiple personas for the device. We describe the approach, and present a proof of concept implementation on Android.