{"id":"https://openalex.org/W1965986943","doi":"https://doi.org/10.1109/isias.2013.6947734","title":"Towards enforcing on-the-fly policies in BYOD environments","display_name":"Towards enforcing on-the-fly policies in BYOD environments","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W1965986943","doi":"https://doi.org/10.1109/isias.2013.6947734","mag":"1965986943"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2013.6947734","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2013.6947734","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061188697","display_name":"Gianpiero Costantino","orcid":"https://orcid.org/0000-0002-2900-262X"},"institutions":[{"id":"https://openalex.org/I4210130157","display_name":"Institute of Informatics and Telematics","ror":"https://ror.org/02gdcn153","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210130157","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Gianpiero Costantino","raw_affiliation_strings":["Consiglio Nazionale delle Ricerche, Istituto di Informatica e Telematica, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Consiglio Nazionale delle Ricerche, Istituto di Informatica e Telematica, Pisa, Italy","institution_ids":["https://openalex.org/I4210130157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101546784","display_name":"Fabio Martinelli","orcid":"https://orcid.org/0000-0002-6721-9395"},"institutions":[{"id":"https://openalex.org/I4210130157","display_name":"Institute of Informatics and Telematics","ror":"https://ror.org/02gdcn153","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210130157","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fabio Martinelli","raw_affiliation_strings":["Consiglio Nazionale delle Ricerche, Istituto di Informatica e Telematica, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Consiglio Nazionale delle Ricerche, Istituto di Informatica e Telematica, Pisa, Italy","institution_ids":["https://openalex.org/I4210130157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043827499","display_name":"Andrea Saracino","orcid":"https://orcid.org/0000-0001-8149-9322"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]},{"id":"https://openalex.org/I4210130157","display_name":"Institute of Informatics and Telematics","ror":"https://ror.org/02gdcn153","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210130157","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Saracino","raw_affiliation_strings":["Consiglio Nazionale delle Ricerche, Istituto di Informatica e Telematica, Pisa, Italy","Dipartimento di Ingegneria dell\u2019 lnformazione, Universit\u00e0 di Pisa, Italy","Dipartimento di Ingegneria dell' lnformazione, Universit\u00e0 di Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Consiglio Nazionale delle Ricerche, Istituto di Informatica e Telematica, Pisa, Italy","institution_ids":["https://openalex.org/I4210130157"]},{"raw_affiliation_string":"Dipartimento di Ingegneria dell\u2019 lnformazione, Universit\u00e0 di Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]},{"raw_affiliation_string":"Dipartimento di Ingegneria dell' lnformazione, Universit\u00e0 di Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001748768","display_name":"Daniele Sgandurra","orcid":"https://orcid.org/0000-0001-5238-8068"},"institutions":[{"id":"https://openalex.org/I4210130157","display_name":"Institute of Informatics and Telematics","ror":"https://ror.org/02gdcn153","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210130157","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Daniele Sgandurra","raw_affiliation_strings":["Consiglio Nazionale delle Ricerche, Istituto di Informatica e Telematica, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Consiglio Nazionale delle Ricerche, Istituto di Informatica e Telematica, Pisa, Italy","institution_ids":["https://openalex.org/I4210130157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061188697"],"corresponding_institution_ids":["https://openalex.org/I4210130157"],"apc_list":null,"apc_paid":null,"fwci":3.9007,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.93573184,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2013","issue":null,"first_page":"61","last_page":"65"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bring-your-own-device","display_name":"Bring your own device","score":0.9145718216896057},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.702889084815979},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.671840488910675},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6547015905380249},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.6019644737243652},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5848160982131958},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5690069198608398},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5662115812301636},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5544334650039673},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5104245543479919},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4875154197216034},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.41381117701530457},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.41041287779808044},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3603118658065796}],"concepts":[{"id":"https://openalex.org/C2778282719","wikidata":"https://www.wikidata.org/wiki/Q917419","display_name":"Bring your own device","level":3,"score":0.9145718216896057},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.702889084815979},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.671840488910675},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6547015905380249},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.6019644737243652},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5848160982131958},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5690069198608398},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5662115812301636},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5544334650039673},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5104245543479919},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4875154197216034},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.41381117701530457},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.41041287779808044},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3603118658065796},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2013.6947734","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2013.6947734","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1000018889","https://openalex.org/W1504669610","https://openalex.org/W1542792105","https://openalex.org/W1821135345","https://openalex.org/W1966825932","https://openalex.org/W2011362885","https://openalex.org/W2145187482","https://openalex.org/W2408322241","https://openalex.org/W6629953387","https://openalex.org/W6713900569"],"related_works":["https://openalex.org/W2393973626","https://openalex.org/W2107355607","https://openalex.org/W2012419258","https://openalex.org/W318167434","https://openalex.org/W1485764028","https://openalex.org/W1482564230","https://openalex.org/W4285408982","https://openalex.org/W2127259385","https://openalex.org/W2004929657","https://openalex.org/W2573786566"],"abstract_inverted_index":{"The":[0,94,130],"Bring":[1],"Your":[2],"Own":[3],"Device":[4],"(BYOD)":[5],"paradigm":[6],"is":[7,134,146],"becoming":[8],"extremely":[9],"popular":[10],"across":[11],"all":[12,64],"kind":[13],"of":[14,37,150],"organizations.":[15],"In":[16],"fact,":[17],"employees":[18],"are":[19,53],"continually":[20],"trying":[21],"to":[22,34,42],"incorporate":[23],"their":[24,38],"personal":[25],"devices,":[26],"e.g.":[27],"smartphones":[28],"and":[29,107,128,143,154],"tablets,":[30],"into":[31],"the":[32,44,69,125,140],"office":[33],"perform":[35],"some":[36],"work":[39],"or":[40,51],"simply":[41],"access":[43,100],"Internet":[45],"with":[46],"a":[47,81,98,117,121,151],"device":[48,141],"they":[49,52],"trust":[50],"more":[54],"familiar":[55],"with.":[56],"Unfortunately,":[57],"several":[58],"security":[59],"issues":[60],"may":[61],"arise":[62],"from":[63,120],"these":[65,74],"external":[66],"devices":[67],"accessing":[68],"corporate":[70],"network.":[71],"To":[72,111],"address":[73],"issues,":[75],"in":[76],"this":[77,112],"paper":[78],"we":[79],"propose":[80],"framework":[82,96],"that":[83],"enforces":[84],"on-the-fly":[85],"instantiated":[86],"policies":[87],"inside":[88],"organizations":[89],"using":[90,136],"trusted":[91],"BYOD":[92],"technologies.":[93],"proposed":[95],"implements":[97],"role-based":[99],"control":[101],"system":[102],"based":[103,123],"upon":[104,124],"user":[105,115,132],"identity":[106,133],"her":[108],"current":[109,126],"context.":[110,129],"end,":[113],"each":[114,159],"receives":[116],"specific":[118],"policy":[119,144],"server":[122],"role":[127],"effective":[131],"confirmed":[135],"OAuth":[137],"2.0,":[138],"while":[139],"integrity":[142],"enforcement":[145],"ensured":[147],"by":[148],"means":[149],"on-device":[152],"root-of-trust":[153],"an":[155],"enforcer":[156],"running":[157],"on":[158],"device.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
