Threat modeling of a mobile device management system for secure smart work

被引:0
|
作者
Keunwoo Rhee
Dongho Won
Sang-Woon Jang
Sooyoung Chae
Sangwoo Park
机构
[1] The Attached Institute of ETRI,College of Information and Communication Engineering
[2] Sungkyunkwan University,undefined
来源
Electronic Commerce Research | 2013年 / 13卷
关键词
Mobile device management system; Threat modeling; Security requirement; Smartphone; Tablet PC;
D O I
暂无
中图分类号
学科分类号
摘要
To enhance the security of mobile devices, enterprises are developing and adopting mobile device management systems. However, if a mobile device management system is exploited, mobile devices and the data they contain will be compromised. Therefore, it is important to perform extensive threat modeling to develop realistic and meaningful security requirements and functionalities. In this paper, we analyze some current threat modeling methodologies, propose a new threat modeling methodology and present all possible threats against a mobile device management system by analyzing and identifying threat agents, assets, and adverse actions. This work will be used for developing security requirements such as a protection profile and design a secure system.
引用
收藏
页码:243 / 256
页数:13
相关论文
共 50 条
  • [21] Bluetooth Door Lock System Based on Smart Mobile Device
    Guo, Hengyuan
    Zeng, Qian
    Chen, Zike
    Zhao, Ming
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018,
  • [22] Clinical specimen receipt system using a mobile smart device
    Lee, Kap No
    Kim, Deok Whan
    Kim, Hyung Jun
    Cho, Nam Sik
    Lee, Bong Woo
    DIGITAL HEALTHCARE EMPOWERING EUROPEANS, 2015, 210 : 951 - 952
  • [23] Threat Modelling and Beyond-Novel Approaches to Cyber Secure the Smart Energy System
    Vallant, Heribert
    Stojanovic, Branka
    Bozic, Josip
    Hofer-Schmitz, Katharina
    APPLIED SCIENCES-BASEL, 2021, 11 (11):
  • [24] A secure and traceable E-DRM system based on mobile device
    Chen, Chin-Ling
    EXPERT SYSTEMS WITH APPLICATIONS, 2008, 35 (03) : 878 - 886
  • [25] Formal modeling and analysis of a secure mobile-agent system
    Ma, Lu
    Tsai, Jeffrey J. P.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2008, 38 (01): : 180 - 196
  • [26] Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - an overview of considerations
    Ingalsbe, Jeffrey A.
    Shoemaker, Dan
    Mead, Nancy R.
    AMCIS 2011 PROCEEDINGS, 2011,
  • [27] High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
    Sun, Gengxin
    Bin, Sheng
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (01): : 127 - 136
  • [28] Web based Management System of a Remote Mobile Device using Device Management Protocol
    Ryu, Hyun-Ki
    Cho, Sung-Rae
    Shiquan, Piao
    Son, Jong-Wuk
    Jung, Woo-Young
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 242 - 249
  • [29] Consolidated Identity Management System for secure mobile cloud computing
    Khalil, Issa
    Khreishah, Abdallah
    Azeem, Muhammad
    COMPUTER NETWORKS, 2014, 65 : 99 - 110
  • [30] Smart Work Injury Management (SWIM) System: Artificial Intelligence in Work Disability Management
    Cheng, Andy S. K.
    Ng, Peter H. F.
    Sin, Zackary P. T.
    Lai, Sun H. S.
    Law, S. W.
    JOURNAL OF OCCUPATIONAL REHABILITATION, 2020, 30 (03) : 354 - 361