Review Article
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives
Table 3
Implementation of the proposed framework.
| Features implementation | Proposed framework |
| Network structure | Accessing within corporate network | + | Accessing from public network | + |
| Secure communication channel | SSL/TLS | + | VPN | − |
| Location-based function | Location tracking | + | Location-based policy enforcing | |
| Identities preserving | Identities blurring/hiding | − |
| Sensitive information preserving | Passcode locking | + | Data encryption | − | Remote wiping | + |
| Platform dependency | Support major mobile OSes | + | Central management platform | + |
| Security architecture | Virtualization, walled garden, and limit separation | + | Trusted boot | + |
| Multiple devices management | Individual management | + | Central management | + |
| Provisioning | Network connection | + | Corporate email | + | Corporate apps | + |
| Policy enforcing | Role-based enforcing | + | Location-based enforcing | |
|
|
+: the feature is implemented. −: the feature is not implemented. : the feature can possibly be implemented in the future.
|