Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1295
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abisheka, P. A. C | - |
dc.contributor.author | Azra, M. A. F | - |
dc.contributor.author | Poobalan, A. V | - |
dc.contributor.author | Wijekoon, J | - |
dc.contributor.author | Yapa, K | - |
dc.contributor.author | Murthaja, M | - |
dc.date.accessioned | 2022-02-21T04:33:44Z | - |
dc.date.available | 2022-02-21T04:33:44Z | - |
dc.date.issued | 2021-12-09 | - |
dc.identifier.citation | P. A. C. Abisheka, M. A. F. Azra, A. V. Poobalan, J. Wijekoon, K. Yapa and M. Murthaja, "An Automated Solution For Securing Confidential Documents in a BYOD Environment," 2021 3rd International Conference on Advancements in Computing (ICAC), 2021, pp. 61-66, doi: 10.1109/ICAC54203.2021.9671200. | en_US |
dc.identifier.isbn | 978-1-6654-0862-2 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1295 | - |
dc.description.abstract | BYOD or Bring Your Own Device is a set of policies that allow employees of an organization to use their own devices for official work purposes. BYOD is an immensely popular concept in the present day due to the many advantages it provides. However, the implementation of BYOD policies entail diverse problems and as a result, the confidentiality of documents can be breached. Furthermore, employees without security awareness and training are highly vulnerable to endpoint attacks, network attacks, and zero-day attacks that lead to a breach of confidentiality, integrity, and availability (CIA). In this context, this paper proposes a comprehensive solution; ‘BYODENCE’, for the detection and prevention of unauthorized access to organizational documents. BYODENCE is an efficient BYOD solution which can produce competitive results in terms of accuracy and speed. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2021 3rd International Conference on Advancements in Computing (ICAC);Pages 61-66 | - |
dc.subject | Access Control | en_US |
dc.subject | BYOD | en_US |
dc.subject | Document Sensitivity Classification | en_US |
dc.subject | File Event | en_US |
dc.subject | File Injection | en_US |
dc.title | An Automated Solution For Securing Confidential Documents in a BYOD Environment | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICAC54203.2021.9671200 | en_US |
Appears in Collections: | Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An_Automated_Solution_For_Securing_Confidential_Documents_in_a_BYOD_Environment.pdf Until 2050-12-31 | 1.5 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.