• DocumentCode
    1767572
  • Title

    A framework along with guidelines for designing secure mobile enterprise applications

  • Author

    Hasan, Basel ; Dmitriyev, Viktor ; Gomez, Jorge Marx ; Kurzhofer, Joachim

  • Author_Institution
    Dept. of Comput. Sci., Carl von Ossietzky Univ. of Oldenburg, Oldenburg, Germany
  • fYear
    2014
  • fDate
    13-16 Oct. 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Nowadays enterprises demand mobility and flexibility of their employees as inevitable success factors. Integrating mobile devices like smartphones and tablets into an enterprise gives employees possibilities to work more productively. However, integrating mobile devices and applications has also brought new security challenges and risks. Despite all advantages of mobility, many organizations continue to avoid it due to security issues. Mobile devices are exposed to a wide range of threats that have to be countered. Simply porting information security standards from workstations, notebooks, and server domains to mobile devices is unlikely to be effective. Thus, from enterprise point of view, security levels are not clear on mobile devices. Generally, a high level of security might be reached on mobile devices by setting a high level of restrictions. On the other hand, this might minimize user acceptance and satisfaction factors. In this research, risk analysis with focus on mobile devices is conducted and a framework for designing secure mobile enterprise applications (MEAs) is developed and presented along with step-by-step guidelines. This research mainly supports enterprises in decision-making process during designing MEAs and helping developers to understand the mobile security issues and classify MEAs into security levels. Moreover, security transparency provided by the framework promotes a trustworthy usage of mobile devices in business sector.
  • Keywords
    human factors; notebook computers; risk analysis; smart phones; telecommunication industry; trusted computing; business sector; decision-making process; employee productivity; enterprise employee flexibility; enterprise employee mobility; information security standard porting; mobile applications; mobile devices; mobile security issues; notebooks; risk analysis; secure MEA design; secure mobile enterprise application design; security transparency; server domains; smart phones; success factors; tablets; trustworthy usage; user acceptance factor minimization; user satisfaction factor minimization; workstations; Guidelines; Mobile communication; Mobile handsets; Risk analysis; Security; Standards; Enterprise Mobility; MEAs; Mobile Security; Risk Analysis; User Acceptance;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology (ICCST), 2014 International Carnahan Conference on
  • Conference_Location
    Rome
  • Print_ISBN
    978-1-4799-3530-7
  • Type

    conf

  • DOI
    10.1109/CCST.2014.6987030
  • Filename
    6987030