{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:35:55Z","timestamp":1742978155916,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584683"},{"type":"electronic","value":"9783319584690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58469-0_21","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T11:34:53Z","timestamp":1493811293000},"page":"310-323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Capturing Policies for BYOD"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Hallett","sequence":"first","affiliation":[]},{"given":"David","family":"Aspinall","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"21_CR1","unstructured":"Schulze, H.: BYOD & Mobile Security 2016 Spotlight Report. Technical report. LinkedIn Information Security (2016). http:\/\/static.tenable.com\/whitepapers\/byod-and-mobile-security-report-2016.pdf"},{"issue":"2","key":"21_CR2","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.amsu.2015.03.004","volume":"4","author":"RK Patel","year":"2015","unstructured":"Patel, R.K., et al.: A UK perspective on smartphone use amongst doctors within the surgical profession. Ann. Med. Surg. 4(2), 107\u2013112 (2015)","journal-title":"Ann. Med. Surg."},{"key":"21_CR3","unstructured":"Guerin, N.R.C.: Security Policy for the use of handheld devices in corporate environments. Technical report, SANS, May 2008"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Souppaya, M., Scarfone, K.: Guidelines for managing and securing mobile devices in the enterprise: NIST Special Publication 800\u2013124 Revision 1 (Draft). National Institute of Standards and Technology (2012)","DOI":"10.6028\/NIST.SP.800-124r1"},{"key":"21_CR5","unstructured":"CESG. BYOD Guidance. Good Technology. Technical report, CESG, March 2015"},{"key":"21_CR6","unstructured":"MobileIron Security Labs. Q4 Mobile Security and Risk Review. Technical report, MobileIron Security Labs, December 2015"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Costantino, G., et al.: Towards enforcing on-the-y policies in BYOD environments. In: International Conference on Information Assurance and Security, December 2013","DOI":"10.1109\/ISIAS.2013.6947734"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mori, P., Saracino, A.: Control, enhancing android permission through usage: a BYOD use-case. In: Symposium on Applied Computing (2016)","DOI":"10.1145\/2851613.2851797"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Armando, A., et al.: Enabling BYOD through secure meta-market. In: ACM Conference on Security and Privacy in Wireless & Mobile Networks, August 2014","DOI":"10.1145\/2627393.2627410"},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(12)70111-3","volume":"2012","author":"B Morrow","year":"2012","unstructured":"Morrow, B.: BYOD security challenges: control and protect your most sensitive data. Netw. Secur. 2012, 5\u20138 (2012)","journal-title":"Netw. Secur."},{"issue":"4","key":"21_CR11","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1016\/S1353-4858(13)70050-3","volume":"2013","author":"B Tokuyoshi","year":"2013","unstructured":"Tokuyoshi, B.: The security implications of BYOD. Netw. Secur. 2013(4), 1213 (2013)","journal-title":"Netw. Secur."},{"issue":"4","key":"21_CR12","doi-asserted-by":"publisher","first-page":"619","DOI":"10.3233\/JCS-2009-0364","volume":"18","author":"MY Becker","year":"2010","unstructured":"Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: design and semantics of a decentralized authorization language. J. Comput. Secur. 18(4), 619\u2013665 (2010)","journal-title":"J. Comput. Secur."},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-319-30806-7_14","volume-title":"Engineering Secure Software and Systems","author":"J Hallett","year":"2016","unstructured":"Hallett, J., Aspinall, D.: AppPAL for android. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 216\u2013232. Springer, Cham (2016). doi:10.1007\/978-3-319-30806-7_14"},{"key":"21_CR14","unstructured":"Hallett, J., Aspinall, D.: Specifying BYOD policies with authorization logic. In: PhD Symposium at iFM 2016 on Formal Methods. Reykjavik University, June 2016"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Armando, A., et al.: Developing a NATO BYOD security policy. In: International Conference on Military Communications and Information Systems, May 2016","DOI":"10.1109\/ICMCIS.2016.7496587"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Armando, A., Costa, G., Merlo, A.: Bring your own device, securely. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC 2013), pp. 1852\u20131858. ACM, New York (2013)","DOI":"10.1145\/2480362.2480707"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.entcs.2007.10.013","volume":"197","author":"I Aktug","year":"2008","unstructured":"Aktug, I., Naliuka, K.: ConSpec\u2013a formal language for policy specification. Electron. Notes Theor. Comput. Sci. 197, 45\u201358 (2008)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32, 5 (2014)","journal-title":"ACM Trans. Comput. Syst."},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Jeon, J., et al.: Dr. Android and Mr. Hide: fine-grained permissions in android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2012)","DOI":"10.1145\/2381934.2381938"},{"key":"21_CR20","unstructured":"Xu, R., Sadi, H., Anderson, R.: Aurasium: practical policy enforcement for android applications. In: Usenix Security Symposium (2012)"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Hao, H., Singh, V., Du, W.: On the effectiveness of API-level access control using bytecode rewriting in Android. In: ACM Asia Conference on Computer and Communications Security (2013)","DOI":"10.1145\/2484313.2484317"},{"key":"21_CR22","unstructured":"Kelly, T., Weaver, R.: The goal structuring notation \u2013 a safety argument notation. In: Proceedings of the Dependable Systems and Networks Workshop on Assurance Cases (2004). http:\/\/www-users.cs.york.ac.uk\/tpk\/dsn2004.pdf. Accessed 19 Dec 2016"},{"issue":"12","key":"21_CR23","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1080\/0144929X.2013.824506","volume":"33","author":"P Papapanagiotou","year":"2014","unstructured":"Papapanagiotou, P., Fleuriot, J.D.: Formal verification of collaboration patterns in healthcare. Behav. Inf. Technol. 33(12), 1278\u20131293 (2014)","journal-title":"Behav. Inf. Technol."},{"key":"21_CR24","unstructured":"Smith, R., et al.: Magic quadrant for enterprise mobility management suites. Technical report, G00279887. Gartrer, June 2016. https:\/\/www.gartner.com\/doc\/reprints?id=1-390IMNG&ct=160608&st=sb"},{"key":"21_CR25","unstructured":"Becker, M.Y., Malkis, A., Bussard, L.: A framework for privacy preferences and data-handling policies. Technical report, MSRTR2009128. Microsoft Research (2009)"},{"key":"21_CR26","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-22339-6_4","volume-title":"Secure and Trust Computing, Data Management and Applications","author":"B Aziz","year":"2011","unstructured":"Aziz, B., Arenas, A., Wilson, M.: SecPAL4DSA: a policy language for specifying data sharing agreements. In: Park, J.J., Lopez, J., Yeo, S.-S., Shon, T., Taniar, D. (eds.) STA 2011. CCIS, vol. 186, pp. 29\u201336. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-22339-6_4"},{"key":"21_CR27","unstructured":"Healthcare Information Management Systems Society. Mobile Security Toolkit: Sample Mobile Device User Agreement. Healthcare Information and Management Systems Society (2012)"},{"key":"21_CR28","unstructured":"Kennington, G., et al.: Mobiles devices policy. Technical report, Torbay, Southern Devon Health, and Care NHS Trust, March 2014"},{"key":"21_CR29","unstructured":"Williamson, D., Grzybowski, A., Graham, S.: Bring your own device policy. Policy 15. University of Edinburgh, February 2015. http:\/\/www.ed.ac.uk\/files\/imports\/fileManager\/BYODPolicy.pdf. Accessed 14 Oct 2016"},{"key":"21_CR30","unstructured":"Code3PSE.org. Sample BYOD Policy. http:\/\/www.code3pse.com\/public\/media\/22845.pdf. Accessed 14 Oct 2016"},{"key":"21_CR31","unstructured":"IBM MaaS360 - Enterprise Mobility Management (EMM). http:\/\/www-03.ibm.com\/security\/mobile\/maas360.html. Accessed 12 Oct 2016"},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10207-014-0252-y","volume":"14","author":"A Armando","year":"2014","unstructured":"Armando, A., et al.: Formal modeling and automatic enforcement of bring your own device policies. Int. J. Inf. Secur. 14, 123\u2013140 (2014)","journal-title":"Int. J. Inf. Secur."}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58469-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:06:09Z","timestamp":1621641969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58469-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584683","9783319584690"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58469-0_21","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}