Author:
Jamal Fara,Taufik Mohd.,Abdullah Azizol Abdullah,Hanapi Zurina Mohd.
Abstract
Abstract
This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The review result shows that there are 25 authentication techniques proposed across both industry and academic areas to fit into BYOD implementation to enhance the security in preventing and detecting data leakage in the organization. It is hoped that the proposed BYOD authentication solution can help organizations to minimize the number of cases in data leakage while allowing the BYOD concept.
Subject
General Physics and Astronomy
Reference142 articles.
1. BYOD Authentication Process ( BAP ) Using Blockchain Technology;Jamal;Adv. Res. Dyn. Control Syst.,2018
2. Bring Your Own Device Security Issues and Challenges;Wang,2014
3. Reliable Access Control for Mobile Cloud Computing ( MCC ) With Cache-Aware Scheduling;Jamal;IEEE Access,2019
4. A Bring-your-own-device Case for Use in the Classroom;Sipior,2017
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献