• DocumentCode
    2034293
  • Title

    A model for secure mobile computing

  • Author

    du Toit, Jaco ; Ellefsen, Ian

  • Author_Institution
    Univ. of Johannesburg, Johannesburg, South Africa
  • fYear
    2015
  • fDate
    28-30 July 2015
  • Firstpage
    1213
  • Lastpage
    1221
  • Abstract
    People are increasingly using different mobile devices for different personal and business applications and data. In order for users to transfer data from one device to another, potentially insecure cloud storage solutions are being used. This problem becomes more pronounced when people starts transferring corporate data between devices using potentially insecure cloud storage solutions. The Neo model presented in this paper provides a conceptual solution where a user will have one device, called the Neo device that can be used for both business and personal use. The device interfaces with different types of inputoutput peripherals allowing the user the freedom to choose an IO peripheral for a specific need. The Neo model also describes how a company can control access to the data and applications stored on the Neo device belonging to the company without having access to personal data stored on the Neo device.
  • Keywords
    authorisation; business data processing; cloud computing; mobile computing; mobile handsets; peripheral interfaces; IO peripheral; Neo device; Neo model; business applications; corporate data; input-output peripherals; mobile devices; personal applications; personal data; potentially insecure cloud storage solutions; secure mobile computing; Authorization; Computational modeling; Containers; Keyboards; Mobile communication; Mobile handsets; Object recognition; access; authorization; communication; identification; isolation; mobile; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Science and Information Conference (SAI), 2015
  • Conference_Location
    London
  • Type

    conf

  • DOI
    10.1109/SAI.2015.7237299
  • Filename
    7237299