Modifying pre-existing mobile applications to implement enterprise security policies

作者: Thomas H. DeBenning , Olivier Andre , Shafaq Abdullah , Waheed Qureshi

DOI:

关键词:

摘要: A system is disclosed that includes components and features for enabling enterprise users to securely access resources (documents, data, application servers, etc.) using their mobile devices. An can use some or all of the to, example, but flexibly implement a BYOD (bring your own device) policy in which run both personal applications secure on The may, policies controlling device accesses based attributes (e.g., what are installed), user user's position department), behavioral attributes, other criteria. Client-side code installed devices may further enhance security by, creating container locally storing execution environment running applications, and/or tunnels communicating with system.

参考文章(394)
Kenneth Seier, Coleen Crawford, Flexible multi-media data management ,(2006)
Paul Krzyzanowski, Daniel Gittleman, Communication devices, networks, services and accompanying methods ,(2011)
Abolfazl Sirjani, Michael Burr, Min-Chih Earl, Anatoliy Panasyuk, System and method for managing virtual ip addresses ,(2004)
Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang, Plagiarizing smartphone applications: attack strategies and defense techniques international conference on engineering secure software and systems. pp. 106- 120 ,(2012) , 10.1007/978-3-642-28166-2_11
Vadim Draluk, Jan-Willem Maarse, Francois Goldfain, Sean Xiao, Geng Chen, Mode sensitive networking ,(2011)