H. Schulze, BYOD & Mobile Security 2016 Spotlight Report. Tech. rep. LinkedIn Information Security, 2016.

R. K. Patel, A UK perspective on smartphone use amongst doctors within the surgical profession, Annals of Medicine and Surgery, vol.4, issue.2, 2015.
DOI : 10.1016/j.amsu.2015.03.004

N. R. Guerin, Security Policy for the use of handheld devices in corporate environments, 2008.

M. Souppaya and K. Scarfone, Guidelines for Managing and Securing Mobile Devices in the Enterprise: NIST Special Publication 800-124 Revision 1 (Draft)

C. Byod-guidance, Good Technology, 2015.

G. Costantino, Towards enforcing on-the-fly policies in BYOD environments, 2013 9th International Conference on Information Assurance and Security (IAS), 2013.
DOI : 10.1109/ISIAS.2013.6947734

F. Martinelli, P. Mori, and A. Saracino, Enhancing Android permission through usage control, Proceedings of the 31st Annual ACM Symposium on Applied Computing, SAC '16, 2016.
DOI : 10.1007/978-3-642-21599-5_7

A. Armando, Enabling BYOD through secure meta-market, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, WiSec '14, 2014.
DOI : 10.1145/2627393.2627410

B. Morrow, BYOD security challenges: control and protect your most sensitive data, Network Security, vol.2012, issue.12, 2012.
DOI : 10.1016/S1353-4858(12)70111-3

B. Tokuyoshi, The security implications of BYOD, Network Security 2013, pp.12-13, 2013.
DOI : 10.1016/S1353-4858(13)70050-3

M. Y. Becker, C. Fournet, and A. D. Gordon, SecPAL: Design and semantics of a decentralized authorization language, Journal of Computer Security, vol.18, issue.4, 2010.
DOI : 10.3233/JCS-2009-0364

J. Hallett and D. Aspinall, AppPAL for Android, 2016.
DOI : 10.1145/2420950.2420956

J. Hallett and D. Aspinall, Specifying BYOD Policies with Authorization Logic, PhD Symposium at iFM'16 on Formal Methods, 2016.

A. Armando, Developing a NATO BYOD security policy, 2016 International Conference on Military Communications and Information Systems (ICMCIS), 2016.
DOI : 10.1109/ICMCIS.2016.7496587

A. Armando, G. Costa, and A. Merlo, Bring your own device, securely, Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, pp.1852-1858, 2013.
DOI : 10.1145/2480362.2480707

I. Aktug and K. Naliuka, ConSpec A Formal Language for Policy Specification, In: Electronic Notes in Theoretical Computer Science, 2008.
DOI : 10.1016/j.entcs.2007.10.013

URL : https://doi.org/10.1016/j.entcs.2007.10.013

W. Enck, TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, 2014.
DOI : 10.1145/1629575.1629604

J. Jeon, Hide: fine-grained permissions in android applications, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, 2012.

R. Xu, H. Sadi, and R. Anderson, Aurasium: Practical Policy Enforcement for Android Applications, Usenix Security Symposium, 2012.

H. Hao, V. Singh, and W. Du, On the effectiveness of API-level access control using bytecode rewriting in Android, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, 2013.
DOI : 10.1145/2484313.2484317

T. Kelly and R. Weaver, The goal structuring notationa safety argument notation, Proceedings of the dependable systems and networks workshop on assurance cases, 2004.

P. Papapanagiotou and J. D. Fleuriot, Formal verification of collaboration patterns in healthcare, Behaviour & Information Technology, vol.10, issue.3, 2014.
DOI : 10.1370/afm.126

R. Smith, Magic Quadrant for Enterprise Mobility Management Suites url: https: //www . gartner.com/doc/reprints?, pp.1-390, 2016.

M. Y. Becker, A. Malkis, and L. Bussard, A Framework for Privacy Preferences and Data-Handling Policies, 2009.

B. Aziz, A. Arenas, and M. Wilson, SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements, Secure and Trust Computing, Data Management and Applications. Communications in Computer and Information Science 186, pp.29-36, 2011.
DOI : 10.1109/CENTRIC.2010.17

G. Kennington, Mobiles Devices Policy. Tech. rep. Torbay, Southern Devon Health, and Care NHS Trust, 2014.

D. Williamson, A. Grzybowski, and S. Graham, Bring Your Own Device Policy. Policy 15, 2016.

A. Armando, Formal modeling and automatic enforcement of Bring Your Own Device policies, International Journal of Information Security, vol.81, issue.3, 2014.
DOI : 10.1016/0890-5401(89)90031-X