Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/965
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abisheka, P.A.C. | - |
dc.contributor.author | Azra, M.A.F. | - |
dc.contributor.author | Poobalan, A.V. | - |
dc.contributor.author | Wijekoon, J. | - |
dc.contributor.author | Yapa, K. | - |
dc.contributor.author | Murthaja, M. | - |
dc.date.accessioned | 2022-02-07T06:47:29Z | - |
dc.date.available | 2022-02-07T06:47:29Z | - |
dc.date.issued | 2021-12-09 | - |
dc.identifier.issn | 978-1-6654-0862-2/21 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/965 | - |
dc.description.abstract | BYOD or Bring Your Own Device is a set of policies that allow employees of an organization to use their own devices for official work purposes. BYOD is an immensely popular concept in the present day due to the many advantages it provides. However, the implementation of BYOD policies entail diverse problems and as a result, the confidentiality of documents can be breached. Furthermore, employees without security awareness and training are highly vulnerable to endpoint attacks, network attacks, and zero-day attacks that lead to a breach of confidentiality, integrity, and availability (CIA). In this context, this paper proposes a comprehensive solution; ‘BYODENCE’, for the detection and prevention of unauthorized access to organizational documents. BYODENCE is an efficient BYOD solution which can produce competitive results in terms of accuracy and speed. | en_US |
dc.description.sponsorship | Co-Sponsor:Institute of Electrical and Electronic Engineers (IEEE) Academic sponsor:SLIIT UNI Gold Sponsor :London Stock Exchange Group (LSEG) | en_US |
dc.language.iso | en | en_US |
dc.publisher | 2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT | en_US |
dc.subject | Access Control | en_US |
dc.subject | BYOD | en_US |
dc.subject | Document Sensitivity Classification | en_US |
dc.subject | File Event | en_US |
dc.subject | File Injection | en_US |
dc.title | An Automated Solution For Securing Confidential Documents in a BYOD Environment | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICAC54203.2021.9671200 | en_US |
Appears in Collections: | 3rd International Conference on Advancements in Computing (ICAC) | 2021 Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An_Automated_Solution_For_Securing_Confidential_Documents_in_a_BYOD_Environment.pdf Until 2050-12-31 | 1.5 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.