BYOD & Mobile Security 2016 Spotlight Report. Tech. rep. LinkedIn Information Security, 2016. ,
A UK perspective on smartphone use amongst doctors within the surgical profession, Annals of Medicine and Surgery, vol.4, issue.2, 2015. ,
DOI : 10.1016/j.amsu.2015.03.004
Security Policy for the use of handheld devices in corporate environments, 2008. ,
Guidelines for Managing and Securing Mobile Devices in the Enterprise: NIST Special Publication 800-124 Revision 1 (Draft) ,
Good Technology, 2015. ,
Towards enforcing on-the-fly policies in BYOD environments, 2013 9th International Conference on Information Assurance and Security (IAS), 2013. ,
DOI : 10.1109/ISIAS.2013.6947734
Enhancing Android permission through usage control, Proceedings of the 31st Annual ACM Symposium on Applied Computing, SAC '16, 2016. ,
DOI : 10.1007/978-3-642-21599-5_7
Enabling BYOD through secure meta-market, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, WiSec '14, 2014. ,
DOI : 10.1145/2627393.2627410
BYOD security challenges: control and protect your most sensitive data, Network Security, vol.2012, issue.12, 2012. ,
DOI : 10.1016/S1353-4858(12)70111-3
The security implications of BYOD, Network Security 2013, pp.12-13, 2013. ,
DOI : 10.1016/S1353-4858(13)70050-3
SecPAL: Design and semantics of a decentralized authorization language, Journal of Computer Security, vol.18, issue.4, 2010. ,
DOI : 10.3233/JCS-2009-0364
AppPAL for Android, 2016. ,
DOI : 10.1145/2420950.2420956
Specifying BYOD Policies with Authorization Logic, PhD Symposium at iFM'16 on Formal Methods, 2016. ,
Developing a NATO BYOD security policy, 2016 International Conference on Military Communications and Information Systems (ICMCIS), 2016. ,
DOI : 10.1109/ICMCIS.2016.7496587
Bring your own device, securely, Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, pp.1852-1858, 2013. ,
DOI : 10.1145/2480362.2480707
ConSpec A Formal Language for Policy Specification, In: Electronic Notes in Theoretical Computer Science, 2008. ,
DOI : 10.1016/j.entcs.2007.10.013
URL : https://doi.org/10.1016/j.entcs.2007.10.013
TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, 2014. ,
DOI : 10.1145/1629575.1629604
Hide: fine-grained permissions in android applications, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, 2012. ,
Aurasium: Practical Policy Enforcement for Android Applications, Usenix Security Symposium, 2012. ,
On the effectiveness of API-level access control using bytecode rewriting in Android, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, 2013. ,
DOI : 10.1145/2484313.2484317
The goal structuring notationa safety argument notation, Proceedings of the dependable systems and networks workshop on assurance cases, 2004. ,
Formal verification of collaboration patterns in healthcare, Behaviour & Information Technology, vol.10, issue.3, 2014. ,
DOI : 10.1370/afm.126
Magic Quadrant for Enterprise Mobility Management Suites url: https: //www . gartner.com/doc/reprints?, pp.1-390, 2016. ,
A Framework for Privacy Preferences and Data-Handling Policies, 2009. ,
SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements, Secure and Trust Computing, Data Management and Applications. Communications in Computer and Information Science 186, pp.29-36, 2011. ,
DOI : 10.1109/CENTRIC.2010.17
Mobiles Devices Policy. Tech. rep. Torbay, Southern Devon Health, and Care NHS Trust, 2014. ,
Bring Your Own Device Policy. Policy 15, 2016. ,
Formal modeling and automatic enforcement of Bring Your Own Device policies, International Journal of Information Security, vol.81, issue.3, 2014. ,
DOI : 10.1016/0890-5401(89)90031-X