DocumentCode :
1767572
Title :
A framework along with guidelines for designing secure mobile enterprise applications
Author :
Hasan, Basel ; Dmitriyev, Viktor ; Gomez, Jorge Marx ; Kurzhofer, Joachim
Author_Institution :
Dept. of Comput. Sci., Carl von Ossietzky Univ. of Oldenburg, Oldenburg, Germany
fYear :
2014
fDate :
13-16 Oct. 2014
Firstpage :
1
Lastpage :
6
Abstract :
Nowadays enterprises demand mobility and flexibility of their employees as inevitable success factors. Integrating mobile devices like smartphones and tablets into an enterprise gives employees possibilities to work more productively. However, integrating mobile devices and applications has also brought new security challenges and risks. Despite all advantages of mobility, many organizations continue to avoid it due to security issues. Mobile devices are exposed to a wide range of threats that have to be countered. Simply porting information security standards from workstations, notebooks, and server domains to mobile devices is unlikely to be effective. Thus, from enterprise point of view, security levels are not clear on mobile devices. Generally, a high level of security might be reached on mobile devices by setting a high level of restrictions. On the other hand, this might minimize user acceptance and satisfaction factors. In this research, risk analysis with focus on mobile devices is conducted and a framework for designing secure mobile enterprise applications (MEAs) is developed and presented along with step-by-step guidelines. This research mainly supports enterprises in decision-making process during designing MEAs and helping developers to understand the mobile security issues and classify MEAs into security levels. Moreover, security transparency provided by the framework promotes a trustworthy usage of mobile devices in business sector.
Keywords :
human factors; notebook computers; risk analysis; smart phones; telecommunication industry; trusted computing; business sector; decision-making process; employee productivity; enterprise employee flexibility; enterprise employee mobility; information security standard porting; mobile applications; mobile devices; mobile security issues; notebooks; risk analysis; secure MEA design; secure mobile enterprise application design; security transparency; server domains; smart phones; success factors; tablets; trustworthy usage; user acceptance factor minimization; user satisfaction factor minimization; workstations; Guidelines; Mobile communication; Mobile handsets; Risk analysis; Security; Standards; Enterprise Mobility; MEAs; Mobile Security; Risk Analysis; User Acceptance;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology (ICCST), 2014 International Carnahan Conference on
Conference_Location :
Rome
Print_ISBN :
978-1-4799-3530-7
Type :
conf
DOI :
10.1109/CCST.2014.6987030
Filename :
6987030
Link To Document :
بازگشت