Please use this identifier to cite or link to this item: https://ir.swu.ac.th/jspui/handle/123456789/13863
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVorakulpipat C.
dc.contributor.authorPolprasert C.
dc.contributor.authorSiwamogsatham S.
dc.date.accessioned2021-04-05T03:32:31Z-
dc.date.available2021-04-05T03:32:31Z-
dc.date.issued2014
dc.identifier.other2-s2.0-84938691387
dc.identifier.urihttps://ir.swu.ac.th/jspui/handle/123456789/13863-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84938691387&doi=10.1145%2f2659651.2659742&partnerID=40&md5=9e7a819fdbd2a48eb2d29748a56c6681
dc.description.abstractInformation security in critical infrastructure sectors has become a crucial issue in recent years. A drastic increase of mobile device usage for accessing to corporate networks could expose the critical systems to major security risks. The paper provides an overview of research and practice trends in mobile device security focusing on critical infrastructure. This includes access control, next-generation firewall, BYOD control mechanism, and BYOD management and policy. Confidentiality, integrity, and availability issues related on the research and practice trends are discussed, followed by the conclusion. Copyright is held by the owner/author(s).
dc.subjectAccess control
dc.subjectFrequency hopping
dc.subjectMobile devices
dc.subjectMobile security
dc.subjectPublic works
dc.subjectSecurity of data
dc.subjectBring your own devices
dc.subjectControl mechanism
dc.subjectCorporate networks
dc.subjectCritical systems
dc.subjectDevice management
dc.subjectMDM
dc.subjectMobile device security
dc.subjectSecurity
dc.subjectCritical infrastructures
dc.titleManaging mobile device security in critical infrastructure sectors
dc.typeConference Paper
dc.rights.holderScopus
dc.identifier.bibliograpycitationACM International Conference Proceeding Series. Vol 2014-September, (2014), p.65-68
dc.identifier.doi10.1145/2659651.2659742
Appears in Collections:Scopus 1983-2021

Files in This Item:
There are no files associated with this item.


Items in SWU repository are protected by copyright, with all rights reserved, unless otherwise indicated.