Security Policy Management for Handheld Devices
| dc.contributor.author | Jensen, Wayne | |
| dc.contributor.author | Karygiannis, Tom | |
| dc.contributor.author | Iorga, Michaela | |
| dc.contributor.author | Gavrila, Serban | |
| dc.contributor.author | Korolev, Vladimir | |
| dc.date.accessioned | 2018-12-19T17:27:09Z | |
| dc.date.available | 2018-12-19T17:27:09Z | |
| dc.date.issued | 2003-06-30 | |
| dc.description | Security and Management (SAM'03), | en_US |
| dc.description.abstract | The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environments. In this paper, we describe a framework for managing user privileges on handheld devices. Our framework aims at assisting enterprise security officers in creating, distributing, and enforcing group and individual security policies for Personal Digital Assistants, and helping users to automatically comply with their organization’s security policy. Details of a proof-of-concept implementation of the framework are also provided | en_US |
| dc.description.uri | https://ebiquity.umbc.edu/paper/html/id/642/Security-Policy-Management-for-Handheld-Devices | en_US |
| dc.format.extent | 6 pages | en_US |
| dc.genre | conference papers and proceedings | en_US |
| dc.identifier | doi:10.13016/m23lrp-4xh2 | |
| dc.identifier.uri | http://hdl.handle.net/11603/12312 | |
| dc.language.iso | en_US | en_US |
| dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
| dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
| dc.relation.ispartof | UMBC Faculty Collection | |
| dc.relation.ispartof | UMBC Student Collection | |
| dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
| dc.rights | Public Domain Mark 1.0 | * |
| dc.rights | This work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law | |
| dc.rights.uri | http://creativecommons.org/publicdomain/mark/1.0/ | * |
| dc.subject | security policy | en_US |
| dc.subject | trust management | en_US |
| dc.subject | handheld devices | en_US |
| dc.subject | PDA | en_US |
| dc.subject | UMBC Ebiquity Research Group | en_US |
| dc.title | Security Policy Management for Handheld Devices | en_US |
| dc.type | Text | en_US |
