Abstract
This paper discusses an approach to Mobile security solution for enterprise network. It describes a secure solution for protect user devices and corporate information with end-to-end mobile security extending to data, users, devices, applications outside or inside of enterprise network. This solution improves the security of enterprise network by resolve the mobile security problems, increase work process efficiency. As a result, it will deliver data, services in a secure scalable, reliable way across multiple networks with multiple devices and guarantees high usability of system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kietzmann, J., Plangger, K., Eaton., B., Heilgenberg, K., Pitt, L., Berthon, P.: Mobility at work: A typology of mobile communities of practice and contextual ambidexterity. Journal of Strategic Information Systems 3 (4), 16 pages (retrieved November 9, 2013)
Borg, A.: Enterprise Mobility Management Goes Global: Mobility Becomes Core IT. Aberdeen Group, Inc. (retrieved August 24, 2011)
Drake, S.: Embracing Next Generation Mobile Platforms to Solve Business Problems. Computerworld Inc. IDC, 8 pages (retrieved August 24, 2011)
Alms, D.: Understanding Mobility Management: Trends, Priorities and Imperatives. Visage Mobile, 6 pages (retrieved August 24, 2011)
Huawei Technologies Co., Ltd.: Huawei AnyOffice Mobile Security Solution, 12 pages (2013)
IBM.: Mobile device management solutions secure & manage mobile assets, across your enterprise, http://www.sdsems.co.kr/WebContent/product/vpn.jsp
Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) Architecture. RFC 4423. IETF (May 2006)
Carlisle, A., Steve, L.: Understanding PKI: concepts, standards, and deployment considerations, pp. 11–15. Addison-Wesley Professional (2003)
Moskowitz, R., Nikander, P.: Host Identity Protocol. RFC 5201. IETF (April 2008)
Kent, S.: IP Encapsulating Security Payload (ESP). RFC 4303. IETF (December 2005)
Nikander, P., Henderson, T., Vogt, C., Arkko, J.: End-Host Mobility and Multihoming with the Host Identity Protocol. TFC 5206. IETF (April 2008)
Definition: mobile security, http://whatis.techtarget.com/definition/mobile-security
Definition: mobile device management, http://searchmobilecomputing.techtarget.com/definition/mobile-device-management
Definition: Bring your own device, http://en.wikipedia.org/wiki/Bring_your_own_device (accessed March 28, 2014)
Citrix.: 10 “must-haves” for secure enterprise mobility, 12 pages (2013)
International Organization for Standardization (2004), ISO/IEC TR 13335-1: Information technology – Security techniques – Management of information and communications technology security – Part 1: Concepts and models for information and communications technology security management., http://www.iso.org/iso/iso_catalogue_tc/catalogue_detail.htm?csnumber=39066 (accessed March 29, 2014)
Liyanage, M., Gurtov, A.: Secured VPN Models for LTE Backhaul Networks. In: 2012 IEEE Vehicular Technology Conference (VTC Fall), September 3-6, pp. 1–5 (2012)
Nikander, P., Komu, M.: Host Identity Protocol. RFC 5338. IETF (September 2008)
Definition: Certificate server, http://en.wikipedia.org/wiki/Certificate_server (accessed March 29, 2014)
Definition: Application server, http://en.wikipedia.org/wiki/Application_server (accessed March 29, 2014)
DB-Engines Ranking, DB-Engines.com (retrieved December 28, 2013)
Rhee, K., Won, D., Jang, S., Chae, S., Park, S.: Threat modeling of a mobile device management system for secure smart work. Electronic Commerce Research, 1–14 (2013)
Rhee, K., Eun, S., Joo, M., Jeong, J., Won, D.: High-Level Design for a Secure Mobile Device Management System. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol. 8030, pp. 348–356. Springer, Heidelberg (2013)
Rhee, K., Jeon, W., Won, D.: Security Requirements of a Mobile Device Management System. International Journal of Security and Its Applications 6, 353–358 (2012)
Rhee, K.: A Study on the Security Evaluation of a Mobile Device Management System. Ph. D. Dissertation, Sungkyunkwan University, Suwon (2012)
CCMB: Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model Version 3.1 Revision 4 (2012)
Definition: Man in the middle attack, http://en.wikipedia.org/wiki/Man-in-themiddle_attack (accessed March 29, 2014)
Definition: Denial of service attack, http://en.wikipedia.org/wiki/Denial-of-service_attack (accessed March 29, 2014)
Machani, S., Pei, M., Rydell, J.: TOTP: Time-Based One-Time Password Algorithm. RFC 6238. IETF (May 2011)
Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: An HMAC-Based One-Time Password Algorithm. RFC 4226. IETF (December 2005)
Rydell, J., Bajaj, S., Machani, S., Naccache, D.: OCRA: OATH Challenge-Response Algorithm. RFC 6287. IETF (June 2011)
Henderson, T., Nikander, P., Komu, M.: Using the Host Identity Protocol with Legacy Applications. RFC 5338. IETF (September 2008)
Liu, L., Moulic, R., Shea, D.: Cloud Service Portal for Mobile Device Management. In: Proceedings of IEEE 7th International Conference on e-Business Engineering (ICEBE), p. 474 (January 2011)
Kravets, A.G., Gurtjakov, A.S., Darmanian, A.P.: Enterprise intellectual capital management by social learning environment implementation. World Applied Sciences Journal 23(7), 956–964 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Kravets, A.G., Bui, N.D., Al-Ashval, M. (2014). Mobile Security Solution for Enterprise Network. In: Kravets, A., Shcherbakov, M., Kultsova, M., Iijima, T. (eds) Knowledge-Based Software Engineering. JCKBSE 2014. Communications in Computer and Information Science, vol 466. Springer, Cham. https://doi.org/10.1007/978-3-319-11854-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-11854-3_31
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11853-6
Online ISBN: 978-3-319-11854-3
eBook Packages: Computer ScienceComputer Science (R0)