{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T21:47:07Z","timestamp":1759614427352},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118536"},{"type":"electronic","value":"9783319118543"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11854-3_31","type":"book-chapter","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T06:09:04Z","timestamp":1409033344000},"page":"371-382","source":"Crossref","is-referenced-by-count":18,"title":["Mobile Security Solution for Enterprise Network"],"prefix":"10.1007","author":[{"given":"Alla G.","family":"Kravets","sequence":"first","affiliation":[]},{"given":"Ngoc Duong","family":"Bui","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Al-Ashval","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Kietzmann, J., Plangger, K., Eaton., B., Heilgenberg, K., Pitt, L., Berthon, P.: Mobility at work: A typology of mobile communities of practice and contextual ambidexterity. Journal of Strategic Information Systems 3 (4), 16 pages (retrieved November 9, 2013)","DOI":"10.1016\/j.jsis.2013.03.003"},{"key":"31_CR2","unstructured":"Borg, A.: Enterprise Mobility Management Goes Global: Mobility Becomes Core IT. Aberdeen Group, Inc. (retrieved August 24, 2011)"},{"key":"31_CR3","unstructured":"Drake, S.: Embracing Next Generation Mobile Platforms to Solve Business Problems. Computerworld Inc. IDC, 8 pages (retrieved August 24, 2011)"},{"key":"31_CR4","unstructured":"Alms, D.: Understanding Mobility Management: Trends, Priorities and Imperatives. Visage Mobile, 6 pages (retrieved August 24, 2011)"},{"key":"31_CR5","unstructured":"Huawei Technologies Co., Ltd.: Huawei AnyOffice Mobile Security Solution, 12 pages (2013)"},{"key":"31_CR6","unstructured":"IBM.: Mobile device management solutions secure & manage mobile assets, across your enterprise, \n                    \n                      http:\/\/www.sdsems.co.kr\/WebContent\/product\/vpn.jsp"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) Architecture. RFC 4423. IETF (May 2006)","DOI":"10.17487\/rfc4423"},{"key":"31_CR8","unstructured":"Carlisle, A., Steve, L.: Understanding PKI: concepts, standards, and deployment considerations, pp. 11\u201315. Addison-Wesley Professional (2003)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P.: Host Identity Protocol. RFC 5201. IETF (April 2008)","DOI":"10.17487\/rfc5201"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Kent, S.: IP Encapsulating Security Payload (ESP). RFC 4303. IETF (December 2005)","DOI":"10.17487\/rfc4303"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Nikander, P., Henderson, T., Vogt, C., Arkko, J.: End-Host Mobility and Multihoming with the Host Identity Protocol. TFC 5206. IETF (April 2008)","DOI":"10.17487\/rfc5206"},{"key":"31_CR12","unstructured":"Definition: mobile security, \n                    \n                      http:\/\/whatis.techtarget.com\/definition\/mobile-security"},{"key":"31_CR13","unstructured":"Definition: mobile device management, \n                    \n                      http:\/\/searchmobilecomputing.techtarget.com\/definition\/mobile-device-management"},{"key":"31_CR14","unstructured":"Definition: Bring your own device, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Bring_your_own_device\n                    \n                    \n                   (accessed March 28, 2014)"},{"key":"31_CR15","unstructured":"Citrix.: 10 \u201cmust-haves\u201d for secure enterprise mobility, 12 pages (2013)"},{"key":"31_CR16","unstructured":"International Organization for Standardization (2004), ISO\/IEC TR 13335-1: Information technology \u2013 Security techniques \u2013 Management of information and communications technology security \u2013 Part 1: Concepts and models for information and communications technology security management., \n                    \n                      http:\/\/www.iso.org\/iso\/iso_catalogue_tc\/catalogue_detail.htm?csnumber=39066\n                    \n                    \n                   (accessed March 29, 2014)"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Liyanage, M., Gurtov, A.: Secured VPN Models for LTE Backhaul Networks. In: 2012 IEEE Vehicular Technology Conference (VTC Fall), September 3-6, pp. 1\u20135 (2012)","DOI":"10.1109\/VTCFall.2012.6399037"},{"key":"31_CR18","unstructured":"Nikander, P., Komu, M.: Host Identity Protocol. RFC 5338. IETF (September 2008)"},{"key":"31_CR19","unstructured":"Definition: Certificate server, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Certificate_server\n                    \n                    \n                   (accessed March 29, 2014)"},{"key":"31_CR20","unstructured":"Definition: Application server, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Application_server\n                    \n                    \n                   (accessed March 29, 2014)"},{"key":"31_CR21","unstructured":"DB-Engines Ranking, \n                    \n                      DB-Engines.com\n                    \n                    \n                   (retrieved December 28, 2013)"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Rhee, K., Won, D., Jang, S., Chae, S., Park, S.: Threat modeling of a mobile device management system for secure smart work. Electronic Commerce Research, 1\u201314 (2013)","DOI":"10.1007\/s10660-013-9121-4"},{"key":"31_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-642-39345-7_37","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"K. Rhee","year":"2013","unstructured":"Rhee, K., Eun, S., Joo, M., Jeong, J., Won, D.: High-Level Design for a Secure Mobile Device Management System. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol.\u00a08030, pp. 348\u2013356. Springer, Heidelberg (2013)"},{"key":"31_CR24","first-page":"353","volume":"6","author":"K. Rhee","year":"2012","unstructured":"Rhee, K., Jeon, W., Won, D.: Security Requirements of a Mobile Device Management System. International Journal of Security and Its Applications\u00a06, 353\u2013358 (2012)","journal-title":"International Journal of Security and Its Applications"},{"key":"31_CR25","unstructured":"Rhee, K.: A Study on the Security Evaluation of a Mobile Device Management System. Ph. D. Dissertation, Sungkyunkwan University, Suwon (2012)"},{"key":"31_CR26","unstructured":"CCMB: Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model Version 3.1 Revision 4 (2012)"},{"key":"31_CR27","unstructured":"Definition: Man in the middle attack, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Man-in-themiddle_attack\n                    \n                    \n                   (accessed March 29, 2014)"},{"key":"31_CR28","unstructured":"Definition: Denial of service attack, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\n                    \n                    \n                   (accessed March 29, 2014)"},{"key":"31_CR29","unstructured":"Machani, S., Pei, M., Rydell, J.: TOTP: Time-Based One-Time Password Algorithm. RFC 6238. IETF (May 2011)"},{"key":"31_CR30","unstructured":"Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: An HMAC-Based One-Time Password Algorithm. RFC 4226. IETF (December 2005)"},{"key":"31_CR31","unstructured":"Rydell, J., Bajaj, S., Machani, S., Naccache, D.: OCRA: OATH Challenge-Response Algorithm. RFC 6287. IETF (June 2011)"},{"key":"31_CR32","doi-asserted-by":"crossref","unstructured":"Henderson, T., Nikander, P., Komu, M.: Using the Host Identity Protocol with Legacy Applications. RFC 5338. IETF (September 2008)","DOI":"10.17487\/rfc5338"},{"key":"31_CR33","doi-asserted-by":"crossref","unstructured":"Liu, L., Moulic, R., Shea, D.: Cloud Service Portal for Mobile Device Management. In: Proceedings of IEEE 7th International Conference on e-Business Engineering (ICEBE), p. 474 (January 2011)","DOI":"10.1109\/ICEBE.2010.102"},{"issue":"7","key":"31_CR34","first-page":"956","volume":"23","author":"A.G. Kravets","year":"2013","unstructured":"Kravets, A.G., Gurtjakov, A.S., Darmanian, A.P.: Enterprise intellectual capital management by social learning environment implementation. World Applied Sciences Journal\u00a023(7), 956\u2013964 (2013)","journal-title":"World Applied Sciences Journal"}],"container-title":["Communications in Computer and Information Science","Knowledge-Based Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11854-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T17:49:59Z","timestamp":1558979399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11854-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118536","9783319118543"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11854-3_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}