none
碩士 === 國立中央大學 === 資訊管理學系 === 103 === With the rapid development of smart phones, more and more employees are able to carry their own mobile devices to work now, and it derivatives "Bring Your Own Device (BYOD)" phenomenon. Under BYOD, enterprise would want to ensure that the corporate’s in...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/63264468922206068728 |
id |
ndltd-TW-103NCU05396077 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103NCU053960772016-07-02T04:28:43Z http://ndltd.ncl.edu.tw/handle/63264468922206068728 none BYOD 下兼顧公司安全政策與員工隱私保護之資訊流追蹤機制研究 Hong-Yi Guo 郭宏毅 碩士 國立中央大學 資訊管理學系 103 With the rapid development of smart phones, more and more employees are able to carry their own mobile devices to work now, and it derivatives "Bring Your Own Device (BYOD)" phenomenon. Under BYOD, enterprise would want to ensure that the corporate’s information is not abused by employees, so enterprise introduces powerful security systems to do the protection. However, employees concerned about privacy issues the most, but existing architectures do not take it into considerations. Therefore, in order to protect corporate’s information against illegally accessing by employees, but also to pay more attention to protect the privacy of employees while privacy information will not be violated by enterprise, we propose a system architecture to simultaneously protect corporate’s and employee’s data security, to achieve a win-win situation. In this study, business and employees both sides can protect their information by identifying the label, and by using these labels to develope security policies. We use the "Information Flow Tracking" mechanism to monitor the flow of information on mobile devices, and simultaneously check the situation with the security policy, to ensure real-time information on usage is indeed comply with security policy. In the end, we use a number of experiments to prove the functionalities, while corporate’s or employee’s data violate to the policy, our architecture is able to instantly detect it, and do the follow-up of the data protection operations, to protect both employee’s privacy and corporate’s security. Yi-Ming Chen 陳奕明 2015 學位論文 ; thesis 109 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊管理學系 === 103 === With the rapid development of smart phones, more and more employees are able to carry their own mobile devices to work now, and it derivatives "Bring Your Own Device (BYOD)" phenomenon. Under BYOD, enterprise would want to ensure that the corporate’s information is not abused by employees, so enterprise introduces powerful security systems to do the protection. However, employees concerned about privacy issues the most, but existing architectures do not take it into considerations. Therefore, in order to protect corporate’s information against illegally accessing by employees, but also to pay more attention to protect the privacy of employees while privacy information will not be violated by enterprise, we propose a system architecture to simultaneously protect corporate’s and employee’s data security, to achieve a win-win situation. In this study, business and employees both sides can protect their information by identifying the label, and by using these labels to develope security policies. We use the "Information Flow Tracking" mechanism to monitor the flow of information on mobile devices, and simultaneously check the situation with the security policy, to ensure real-time information on usage is indeed comply with security policy. In the end, we use a number of experiments to prove the functionalities, while corporate’s or employee’s data violate to the policy, our architecture is able to instantly detect it, and do the follow-up of the data protection operations, to protect both employee’s privacy and corporate’s security.
|
author2 |
Yi-Ming Chen |
author_facet |
Yi-Ming Chen Hong-Yi Guo 郭宏毅 |
author |
Hong-Yi Guo 郭宏毅 |
spellingShingle |
Hong-Yi Guo 郭宏毅 none |
author_sort |
Hong-Yi Guo |
title |
none |
title_short |
none |
title_full |
none |
title_fullStr |
none |
title_full_unstemmed |
none |
title_sort |
none |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/63264468922206068728 |
work_keys_str_mv |
AT hongyiguo none AT guōhóngyì none AT hongyiguo byodxiàjiāngùgōngsīānquánzhèngcèyǔyuángōngyǐnsībǎohùzhīzīxùnliúzhuīzōngjīzhìyánjiū AT guōhóngyì byodxiàjiāngùgōngsīānquánzhèngcèyǔyuángōngyǐnsībǎohùzhīzīxùnliúzhuīzōngjīzhìyánjiū |
_version_ |
1718333125248942080 |