Review Article

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

Table 2

A comparative analysis of device management frameworks.

Technical specification Typical personal device management frameworkThe proposed framework

Network structurePublic networkCorporate network, trusted network, and secured network
Secure communication channelSSL/TLS, proprietarySSL/TLS, VPN
Location-based functionLocation trackingLocation tracking and location-based policy enforcement
Identity preservationUnknown, proprietaryk-Anonymity, area cloaking, one-way hash, and public-key cryptographic
Sensitive information preservationUnknown, optionalPasscode locking, data/storage encryption, and remote wiping/selective wiping
Platform dependencyPlatform dependent, vendor specificPlatform independent
Security architectureOperating system security in generalEmphasis on virtualization, walled garden, limited separation, and trusted boot
Multiple device managementManaged individuallyManaged individually or centrally by company
ProvisioningNot providedCorporate network connection, corporate email, and other corporate applications
Policy enforcementNot providedRole-based policy enforcing and location-based policy enforcing