Review Article
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives
Table 2
A comparative analysis of device management frameworks.
| Technical specification | Typical personal device management framework | The proposed framework |
| Network structure | Public network | Corporate network, trusted network, and secured network | Secure communication channel | SSL/TLS, proprietary | SSL/TLS, VPN | Location-based function | Location tracking | Location tracking and location-based policy enforcement
| Identity preservation | Unknown, proprietary | k-Anonymity, area cloaking, one-way hash, and public-key cryptographic | Sensitive information preservation | Unknown, optional | Passcode locking, data/storage encryption, and remote wiping/selective wiping
| Platform dependency | Platform dependent, vendor specific | Platform independent | Security architecture | Operating system security in general | Emphasis on virtualization, walled garden, limited separation, and trusted boot | Multiple device management | Managed individually | Managed individually or centrally by company | Provisioning | Not provided | Corporate network connection, corporate email, and other corporate applications | Policy enforcement | Not provided | Role-based policy enforcing and location-based policy enforcing |
|
|