Overview of Mobile Containerization Approaches and Open Research Directions

被引:1
作者
Oluwatimi, Oyindamola [1 ]
Midi, Daniele [1 ]
Bertino, Elisa [2 ]
机构
[1] Purdue Univ, Coll Comp Sci, W Lafayette, IN 47907 USA
[2] Purdue Univ, Comp Sci, W Lafayette, IN 47907 USA
关键词
SECURITY;
D O I
10.1109/MSP.2017.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When a mobile device is used for both personal and business purposes, securing enterprise content and preserving employees' privacy are vital. Containerization is a promising approach to address such requirements. © 2016 IEEE.
引用
收藏
页码:22 / 31
页数:10
相关论文
共 24 条
  • [1] Andrus J, 2011, SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P173
  • [2] [Anonymous], 2012, P 8 S US PRIV SEC SO
  • [3] [Anonymous], 2014, SAMS GREEN HILLS MOB
  • [4] [Anonymous], CISC VIS NETW IND GL
  • [5] Asokan N., 2014, P 5 USENIX C OFF
  • [6] Brodie Carolyn, 2005, SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security, V93, P35, DOI 10.1145/1073001.1073005
  • [7] Chadwick D.W., 2008, MIDSEC 08, P1, DOI [10.1145/1463342, DOI 10.1145/1463342]
  • [8] Conti M., 2010, P ISC 10, P331
  • [9] Cornwell J., 2006, P 8 IEEE WORKSH MOB, P14
  • [10] Davi L., LNCS, V6531, P346