none

碩士 === 國立中央大學 === 資訊管理學系 === 103 === With the rapid development of smart phones, more and more employees are able to carry their own mobile devices to work now, and it derivatives "Bring Your Own Device (BYOD)" phenomenon. Under BYOD, enterprise would want to ensure that the corporate’s in...

Full description

Bibliographic Details
Main Authors: Hong-Yi Guo, 郭宏毅
Other Authors: Yi-Ming Chen
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/63264468922206068728
id ndltd-TW-103NCU05396077
record_format oai_dc
spelling ndltd-TW-103NCU053960772016-07-02T04:28:43Z http://ndltd.ncl.edu.tw/handle/63264468922206068728 none BYOD 下兼顧公司安全政策與員工隱私保護之資訊流追蹤機制研究 Hong-Yi Guo 郭宏毅 碩士 國立中央大學 資訊管理學系 103 With the rapid development of smart phones, more and more employees are able to carry their own mobile devices to work now, and it derivatives "Bring Your Own Device (BYOD)" phenomenon. Under BYOD, enterprise would want to ensure that the corporate’s information is not abused by employees, so enterprise introduces powerful security systems to do the protection. However, employees concerned about privacy issues the most, but existing architectures do not take it into considerations. Therefore, in order to protect corporate’s information against illegally accessing by employees, but also to pay more attention to protect the privacy of employees while privacy information will not be violated by enterprise, we propose a system architecture to simultaneously protect corporate’s and employee’s data security, to achieve a win-win situation. In this study, business and employees both sides can protect their information by identifying the label, and by using these labels to develope security policies. We use the "Information Flow Tracking" mechanism to monitor the flow of information on mobile devices, and simultaneously check the situation with the security policy, to ensure real-time information on usage is indeed comply with security policy. In the end, we use a number of experiments to prove the functionalities, while corporate’s or employee’s data violate to the policy, our architecture is able to instantly detect it, and do the follow-up of the data protection operations, to protect both employee’s privacy and corporate’s security. Yi-Ming Chen 陳奕明 2015 學位論文 ; thesis 109 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 資訊管理學系 === 103 === With the rapid development of smart phones, more and more employees are able to carry their own mobile devices to work now, and it derivatives "Bring Your Own Device (BYOD)" phenomenon. Under BYOD, enterprise would want to ensure that the corporate’s information is not abused by employees, so enterprise introduces powerful security systems to do the protection. However, employees concerned about privacy issues the most, but existing architectures do not take it into considerations. Therefore, in order to protect corporate’s information against illegally accessing by employees, but also to pay more attention to protect the privacy of employees while privacy information will not be violated by enterprise, we propose a system architecture to simultaneously protect corporate’s and employee’s data security, to achieve a win-win situation. In this study, business and employees both sides can protect their information by identifying the label, and by using these labels to develope security policies. We use the "Information Flow Tracking" mechanism to monitor the flow of information on mobile devices, and simultaneously check the situation with the security policy, to ensure real-time information on usage is indeed comply with security policy. In the end, we use a number of experiments to prove the functionalities, while corporate’s or employee’s data violate to the policy, our architecture is able to instantly detect it, and do the follow-up of the data protection operations, to protect both employee’s privacy and corporate’s security.
author2 Yi-Ming Chen
author_facet Yi-Ming Chen
Hong-Yi Guo
郭宏毅
author Hong-Yi Guo
郭宏毅
spellingShingle Hong-Yi Guo
郭宏毅
none
author_sort Hong-Yi Guo
title none
title_short none
title_full none
title_fullStr none
title_full_unstemmed none
title_sort none
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/63264468922206068728
work_keys_str_mv AT hongyiguo none
AT guōhóngyì none
AT hongyiguo byodxiàjiāngùgōngsīānquánzhèngcèyǔyuángōngyǐnsībǎohùzhīzīxùnliúzhuīzōngjīzhìyánjiū
AT guōhóngyì byodxiàjiāngùgōngsīānquánzhèngcèyǔyuángōngyǐnsībǎohùzhīzīxùnliúzhuīzōngjīzhìyánjiū
_version_ 1718333125248942080