Loading...
- Type of Document: M.Sc. Thesis
- Language: Farsi
- Document No: 52578 (19)
- University: Sharif University of Technology
- Department: Computer Engineering
- Advisor(s): Amini, Morteza
- Abstract:
- The expansion of technology and the increasing use of mobile devices and smartphones have aected various aspects of personal and social life. These include the use of personal mobile devices in enterprise environments called BYODs have a number of positive and negative eects. On the one hand, it would be more cost-eective for an organization or business environment for users to use their own devices, but on the other hand, it poses numerous security and information challenges that are important to manage. These include disrupting the user’s privacy or disseminating organization information to personal devices and thus violating the organization’s security policies. In this study, a model is designed and implemented to protect the privacy of users in enterprise management of mobile devices. The proposed model considers important sources of user privacy (such as storage or SMS) as well as the context of users while taking into account user convenience of the requirements of BYOD systems. Users can also save their decisions to grant or deny access. The following thesis describes a method for repackaging enterprise applications to inject control tools to suit users’ preferences and needs and other features of the proposed solution.The dened scenarios are also evaluated according to the organizational plans and the proposed model is evaluated according to the requirements of the users on BYOD systems based on the designed questionnaire. Finally, the advantages of the proposed method compared to similar tasks based on the information obtained through the questionnaire are described
- Keywords:
- Privacy ; Android Security ; Privacy Preserving ; Bring Your Own Device (BYOD) ; Enterprise Mobile Management
- محتواي کتاب
- view
- 1 مقدمه
- 2 مفاهیم پایه
- 3 BYOD و حفاظت از حریم خصوصی کاربر
- 4 روش پیشنهادی برای برقراری حریم خصوصی در سیستمهای BYOD
- 4.1 هدف
- 4.2 مدل اعتماد
- 4.3 فرآیندهای کلان روش پیشنهادی
- 4.4 امضای برنامه
- 4.5 سیاستها
- 4.5.1 ویژگیهای زبان توصیف سیاستهای حریم خصوصی
- 4.5.2 سطوح حریم خصوصی
- 4.5.3 سلسله مراتب منابع
- 4.5.4 شرایط زمینهای
- 4.5.5 سیاست تنزل سطح امنیتی
- 4.5.6 مسندهای پایه در توصیف سیاستها
- 4.5.7 تلاقی سیاستها با اطلاعات زمینهای
- 4.5.8 قواعد دسترسی حافظ حریم خصوصی
- 4.5.9 فرآیند کلی اعمال سیاستها در سیستم
- 4.5.10 فرآیند اعمال سیاستها به صورت خاص منظوره و هنگام پیادهسازی
- 4.6 پالایش حافظ حریم خصوصی اطلاعات
- 4.7 محافظت اطلاعات سازمانی
- 5 پیاده سازی و ارزیابی روش پیشنهادی
- 6 نتیجهگیری و کارهای آتی
- 7 پیوست
- کتابنامه
- واژهنامهی فارسی به انگلیسی
- واژهنامهی انگلیسی به فارسی