{"id":"https://openalex.org/W2132424625","doi":"https://doi.org/10.1109/issa.2015.7335059","title":"Location aware mobile device management","display_name":"Location aware mobile device management","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2132424625","doi":"https://doi.org/10.1109/issa.2015.7335059","mag":"2132424625"},"language":"en","primary_location":{"id":"doi:10.1109/issa.2015.7335059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085987296","display_name":"Jaco du Toit","orcid":"https://orcid.org/0000-0002-4353-1253"},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Jaco du Toit","raw_affiliation_strings":["Academy of Computer Science and Software Engineering, University of Johannesburg, Johannesburg, South Africa","Academy of Computer Science and Software Engineering, University of Johannesburg, South Africa#TAB#"],"affiliations":[{"raw_affiliation_string":"Academy of Computer Science and Software Engineering, University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]},{"raw_affiliation_string":"Academy of Computer Science and Software Engineering, University of Johannesburg, South Africa#TAB#","institution_ids":["https://openalex.org/I24027795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064235782","display_name":"Ian Ellefsen","orcid":null},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Ian Ellefsen","raw_affiliation_strings":["Academy of Computer Science and Software Engineering, University of Johannesburg, Johannesburg, South Africa","Academy of Computer Science and Software Engineering, University of Johannesburg, South Africa#TAB#"],"affiliations":[{"raw_affiliation_string":"Academy of Computer Science and Software Engineering, University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]},{"raw_affiliation_string":"Academy of Computer Science and Software Engineering, University of Johannesburg, South Africa#TAB#","institution_ids":["https://openalex.org/I24027795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085987296"],"corresponding_institution_ids":["https://openalex.org/I24027795"],"apc_list":null,"apc_paid":null,"fwci":0.9985,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79805362,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6676703095436096},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6417164206504822},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6043749451637268},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5958995223045349},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5707666873931885},{"id":"https://openalex.org/keywords/desk","display_name":"Desk","score":0.543400228023529},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.5143902897834778},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5038005709648132},{"id":"https://openalex.org/keywords/default-gateway","display_name":"Default gateway","score":0.4846354126930237},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41874194145202637},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3592662513256073},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14199957251548767},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10399609804153442}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6676703095436096},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6417164206504822},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6043749451637268},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5958995223045349},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5707666873931885},{"id":"https://openalex.org/C2776545233","wikidata":"https://www.wikidata.org/wiki/Q1064858","display_name":"Desk","level":2,"score":0.543400228023529},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.5143902897834778},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5038005709648132},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.4846354126930237},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41874194145202637},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3592662513256073},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14199957251548767},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10399609804153442},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/issa.2015.7335059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1493417499","https://openalex.org/W1596007451","https://openalex.org/W1958068621","https://openalex.org/W1966099911","https://openalex.org/W2006036128","https://openalex.org/W2016198460","https://openalex.org/W2070093900","https://openalex.org/W2114206706","https://openalex.org/W2294993143","https://openalex.org/W2502413263","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2032830291","https://openalex.org/W2390832629","https://openalex.org/W3047644844","https://openalex.org/W1518499115","https://openalex.org/W2122599377","https://openalex.org/W2915304347","https://openalex.org/W2080562317","https://openalex.org/W3045301923","https://openalex.org/W2794872059","https://openalex.org/W76359671"],"abstract_inverted_index":{"Mobile":[0],"devices":[1,110,122],"have":[2,101],"created":[3],"a":[4,26,32,35,42,72,77],"situation":[5],"where":[6,16,44,57,129,153],"system-focused":[7],"security":[8,17,30,146],"may":[9,38],"not":[10],"be":[11,39,118],"sufficient":[12],"in":[13,41],"an":[14,54],"environment":[15],"requirements":[18],"can":[19,117],"change":[20],"depending":[21,127,151],"on":[22,31,128,136,152,159],"the":[23,58,82,102,108,130,137,154,160],"location":[24],"of":[25,65],"mobile":[27,155],"device.":[28],"The":[29,68,98,139],"network":[33],"at":[34,53],"corporate":[36],"company":[37],"different":[40],"boardroom,":[43],"sensitive":[45],"information":[46],"is":[47,71,133,149,157],"discussed":[48],"and":[49,89,106,123],"acted":[50],"upon,":[51],"than":[52],"employee's":[55],"desk,":[56],"employee":[59],"works":[60],"with":[61],"his":[62],"normal":[63],"line":[64],"business":[66],"application.":[67],"Neo":[69,83,109,121,131,140],"Model":[70,141],"conceptual":[73],"model":[74],"that":[75,113,148],"describes":[76],"hypothetical":[78],"black":[79],"box,":[80],"called":[81],"device,":[84],"which":[85],"uses":[86],"secure":[87,115],"containers":[88,116],"mutual":[90],"authentication":[91],"to":[92,94,104,111,120,144],"connect":[93],"specialised":[95,114],"gateway":[96,99],"controllers.":[97],"controllers":[100],"ability":[103],"control":[105],"manage":[107],"ensure":[112],"provisioned":[119],"activated":[124],"or":[125],"deactivated,":[126],"device":[132,156],"physically":[134],"located":[135,158],"network.":[138,161],"allows":[142],"companies":[143],"define":[145],"controls":[147],"applicable":[150]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
