Skip to main content

Mobile Security Solution for Enterprise Network

  • Conference paper
Book cover Knowledge-Based Software Engineering (JCKBSE 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 466))

Included in the following conference series:

Abstract

This paper discusses an approach to Mobile security solution for enterprise network. It describes a secure solution for protect user devices and corporate information with end-to-end mobile security extending to data, users, devices, applications outside or inside of enterprise network. This solution improves the security of enterprise network by resolve the mobile security problems, increase work process efficiency. As a result, it will deliver data, services in a secure scalable, reliable way across multiple networks with multiple devices and guarantees high usability of system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kietzmann, J., Plangger, K., Eaton., B., Heilgenberg, K., Pitt, L., Berthon, P.: Mobility at work: A typology of mobile communities of practice and contextual ambidexterity. Journal of Strategic Information Systems 3 (4), 16 pages (retrieved November 9, 2013)

    Google Scholar 

  2. Borg, A.: Enterprise Mobility Management Goes Global: Mobility Becomes Core IT. Aberdeen Group, Inc. (retrieved August 24, 2011)

    Google Scholar 

  3. Drake, S.: Embracing Next Generation Mobile Platforms to Solve Business Problems. Computerworld Inc. IDC, 8 pages (retrieved August 24, 2011)

    Google Scholar 

  4. Alms, D.: Understanding Mobility Management: Trends, Priorities and Imperatives. Visage Mobile, 6 pages (retrieved August 24, 2011)

    Google Scholar 

  5. Huawei Technologies Co., Ltd.: Huawei AnyOffice Mobile Security Solution, 12 pages (2013)

    Google Scholar 

  6. IBM.: Mobile device management solutions secure & manage mobile assets, across your enterprise, http://www.sdsems.co.kr/WebContent/product/vpn.jsp

  7. Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) Architecture. RFC 4423. IETF (May 2006)

    Google Scholar 

  8. Carlisle, A., Steve, L.: Understanding PKI: concepts, standards, and deployment considerations, pp. 11–15. Addison-Wesley Professional (2003)

    Google Scholar 

  9. Moskowitz, R., Nikander, P.: Host Identity Protocol. RFC 5201. IETF (April 2008)

    Google Scholar 

  10. Kent, S.: IP Encapsulating Security Payload (ESP). RFC 4303. IETF (December 2005)

    Google Scholar 

  11. Nikander, P., Henderson, T., Vogt, C., Arkko, J.: End-Host Mobility and Multihoming with the Host Identity Protocol. TFC 5206. IETF (April 2008)

    Google Scholar 

  12. Definition: mobile security, http://whatis.techtarget.com/definition/mobile-security

  13. Definition: mobile device management, http://searchmobilecomputing.techtarget.com/definition/mobile-device-management

  14. Definition: Bring your own device, http://en.wikipedia.org/wiki/Bring_your_own_device (accessed March 28, 2014)

  15. Citrix.: 10 “must-haves” for secure enterprise mobility, 12 pages (2013)

    Google Scholar 

  16. International Organization for Standardization (2004), ISO/IEC TR 13335-1: Information technology – Security techniques – Management of information and communications technology security – Part 1: Concepts and models for information and communications technology security management., http://www.iso.org/iso/iso_catalogue_tc/catalogue_detail.htm?csnumber=39066 (accessed March 29, 2014)

  17. Liyanage, M., Gurtov, A.: Secured VPN Models for LTE Backhaul Networks. In: 2012 IEEE Vehicular Technology Conference (VTC Fall), September 3-6, pp. 1–5 (2012)

    Google Scholar 

  18. Nikander, P., Komu, M.: Host Identity Protocol. RFC 5338. IETF (September 2008)

    Google Scholar 

  19. Definition: Certificate server, http://en.wikipedia.org/wiki/Certificate_server (accessed March 29, 2014)

  20. Definition: Application server, http://en.wikipedia.org/wiki/Application_server (accessed March 29, 2014)

  21. DB-Engines Ranking, DB-Engines.com (retrieved December 28, 2013)

  22. Rhee, K., Won, D., Jang, S., Chae, S., Park, S.: Threat modeling of a mobile device management system for secure smart work. Electronic Commerce Research, 1–14 (2013)

    Google Scholar 

  23. Rhee, K., Eun, S., Joo, M., Jeong, J., Won, D.: High-Level Design for a Secure Mobile Device Management System. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol. 8030, pp. 348–356. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  24. Rhee, K., Jeon, W., Won, D.: Security Requirements of a Mobile Device Management System. International Journal of Security and Its Applications 6, 353–358 (2012)

    Google Scholar 

  25. Rhee, K.: A Study on the Security Evaluation of a Mobile Device Management System. Ph. D. Dissertation, Sungkyunkwan University, Suwon (2012)

    Google Scholar 

  26. CCMB: Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model Version 3.1 Revision 4 (2012)

    Google Scholar 

  27. Definition: Man in the middle attack, http://en.wikipedia.org/wiki/Man-in-themiddle_attack (accessed March 29, 2014)

  28. Definition: Denial of service attack, http://en.wikipedia.org/wiki/Denial-of-service_attack (accessed March 29, 2014)

  29. Machani, S., Pei, M., Rydell, J.: TOTP: Time-Based One-Time Password Algorithm. RFC 6238. IETF (May 2011)

    Google Scholar 

  30. Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: An HMAC-Based One-Time Password Algorithm. RFC 4226. IETF (December 2005)

    Google Scholar 

  31. Rydell, J., Bajaj, S., Machani, S., Naccache, D.: OCRA: OATH Challenge-Response Algorithm. RFC 6287. IETF (June 2011)

    Google Scholar 

  32. Henderson, T., Nikander, P., Komu, M.: Using the Host Identity Protocol with Legacy Applications. RFC 5338. IETF (September 2008)

    Google Scholar 

  33. Liu, L., Moulic, R., Shea, D.: Cloud Service Portal for Mobile Device Management. In: Proceedings of IEEE 7th International Conference on e-Business Engineering (ICEBE), p. 474 (January 2011)

    Google Scholar 

  34. Kravets, A.G., Gurtjakov, A.S., Darmanian, A.P.: Enterprise intellectual capital management by social learning environment implementation. World Applied Sciences Journal 23(7), 956–964 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kravets, A.G., Bui, N.D., Al-Ashval, M. (2014). Mobile Security Solution for Enterprise Network. In: Kravets, A., Shcherbakov, M., Kultsova, M., Iijima, T. (eds) Knowledge-Based Software Engineering. JCKBSE 2014. Communications in Computer and Information Science, vol 466. Springer, Cham. https://doi.org/10.1007/978-3-319-11854-3_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11854-3_31

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11853-6

  • Online ISBN: 978-3-319-11854-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics