Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1295
Title: | An Automated Solution For Securing Confidential Documents in a BYOD Environment |
Authors: | Abisheka, P. A. C Azra, M. A. F Poobalan, A. V Wijekoon, J Yapa, K Murthaja, M |
Keywords: | Access Control BYOD Document Sensitivity Classification File Event File Injection |
Issue Date: | 9-Dec-2021 |
Publisher: | IEEE |
Citation: | P. A. C. Abisheka, M. A. F. Azra, A. V. Poobalan, J. Wijekoon, K. Yapa and M. Murthaja, "An Automated Solution For Securing Confidential Documents in a BYOD Environment," 2021 3rd International Conference on Advancements in Computing (ICAC), 2021, pp. 61-66, doi: 10.1109/ICAC54203.2021.9671200. |
Series/Report no.: | 2021 3rd International Conference on Advancements in Computing (ICAC);Pages 61-66 |
Abstract: | BYOD or Bring Your Own Device is a set of policies that allow employees of an organization to use their own devices for official work purposes. BYOD is an immensely popular concept in the present day due to the many advantages it provides. However, the implementation of BYOD policies entail diverse problems and as a result, the confidentiality of documents can be breached. Furthermore, employees without security awareness and training are highly vulnerable to endpoint attacks, network attacks, and zero-day attacks that lead to a breach of confidentiality, integrity, and availability (CIA). In this context, this paper proposes a comprehensive solution; ‘BYODENCE’, for the detection and prevention of unauthorized access to organizational documents. BYODENCE is an efficient BYOD solution which can produce competitive results in terms of accuracy and speed. |
URI: | http://rda.sliit.lk/handle/123456789/1295 |
ISBN: | 978-1-6654-0862-2 |
Appears in Collections: | Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An_Automated_Solution_For_Securing_Confidential_Documents_in_a_BYOD_Environment.pdf Until 2050-12-31 | 1.5 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.