Publication | Closed Access
Security Policy Management for Handheld Devices
20
Citations
1
References
2003
Year
Mobile SecurityEngineeringUsable SecurityInformation SecurityAuthorizationAccess ControlWireless TechnologiesSystem SecuritySecurity ManagementNetworked Computer SystemsData PrivacyComputer ScienceMobile ComputingData SecuritySecurity Policy ManagementSecurityUser PrivilegesTechnologySecurity RisksAuthorization Policies
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environments. In this paper, we describe a framework for managing user privileges on handheld devices. Our framework aims at assisting enterprise security officers in creating, distributing, and enforcing group and individual security policies for Personal Digital Assistants, and helping users to automatically comply with their organization’s security policy. Details of a proof-of-concept implementation of the framework are also provided
| Year | Citations | |
|---|---|---|
Page 1
Page 1