Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/15683
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ganiyu, Shefiu Olusegun | - |
dc.contributor.author | Jimoh, Rasheed Gbenga | - |
dc.date.accessioned | 2022-12-20T19:48:38Z | - |
dc.date.available | 2022-12-20T19:48:38Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/15683 | - |
dc.description.abstract | The emergence of brings your own device (BYOD) strategy has brought considerable benefits to enterprises. However, secure access control to vital enterprise resources is one of the impedances to BYOD adoption. Thus, some researches were directed toward dynamic access control using concepts from risk evaluation, machine learning, or context-awareness. However, research efforts to harmonize the three concepts are yet to be established. Hence, this study proposed an Extended Security Risk Analysis Model (ExtSRAM) that combined the concepts to evolve a risk-based and context-aware model to mitigate access control challenges in BYOD. The proposed model comprised of three blocks, including static risk analysis, user contextual profiling, and risk computation. Furthermore, ExtSRAM utilized the Bayesian network to model user contextual profile and static enterprise risks. Again, the proposed model was formulated on six assumptions for it to be realistic for BYOD strategy. More so, a theoretical validation of ExtSRAM justified its soundness and completeness in estimating security risks for dynamic access control. Really, implementing ExtSRAM will proactively safeguard digital assets against unauthorized access. In doing so, an organization can strategically reposition its workforce for productivity while taking advantage of its investment in BYOD implementation. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer, Switzerland. | en_US |
dc.subject | BYOD | en_US |
dc.subject | Risk-based access control | en_US |
dc.subject | Context-aware access control | en_US |
dc.subject | Risk evaluation model | en_US |
dc.subject | Dynamic access control | en_US |
dc.title | Extended Risk-Based Context-Aware Model for Dynamic Access Control in Bring Your Own Device Strategy | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Information and Media Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Extended risk-based context-aware model for dynamic access control in bring your own device strategy.pdf | 632.11 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.