DocumentCode
2034293
Title
A model for secure mobile computing
Author
du Toit, Jaco ; Ellefsen, Ian
Author_Institution
Univ. of Johannesburg, Johannesburg, South Africa
fYear
2015
fDate
28-30 July 2015
Firstpage
1213
Lastpage
1221
Abstract
People are increasingly using different mobile devices for different personal and business applications and data. In order for users to transfer data from one device to another, potentially insecure cloud storage solutions are being used. This problem becomes more pronounced when people starts transferring corporate data between devices using potentially insecure cloud storage solutions. The Neo model presented in this paper provides a conceptual solution where a user will have one device, called the Neo device that can be used for both business and personal use. The device interfaces with different types of inputoutput peripherals allowing the user the freedom to choose an IO peripheral for a specific need. The Neo model also describes how a company can control access to the data and applications stored on the Neo device belonging to the company without having access to personal data stored on the Neo device.
Keywords
authorisation; business data processing; cloud computing; mobile computing; mobile handsets; peripheral interfaces; IO peripheral; Neo device; Neo model; business applications; corporate data; input-output peripherals; mobile devices; personal applications; personal data; potentially insecure cloud storage solutions; secure mobile computing; Authorization; Computational modeling; Containers; Keyboards; Mobile communication; Mobile handsets; Object recognition; access; authorization; communication; identification; isolation; mobile; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Science and Information Conference (SAI), 2015
Conference_Location
London
Type
conf
DOI
10.1109/SAI.2015.7237299
Filename
7237299
Link To Document