Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters.
Gabriel Salles-LoustauLuis GarciaKaustubh R. JoshiSaman A. ZonouzPublished in: DSN (2016)
Keyphrases
- information security
- security level
- critical infrastructure
- security architecture
- virtual environment
- protection scheme
- data protection
- biometric template
- intrusion detection
- security issues
- web applications
- protection mechanisms
- virtual reality
- computer security
- individual privacy
- augmented reality
- information systems
- data confidentiality
- network security
- access control
- security requirements
- previously mentioned
- data security
- virtual world
- smart grid
- security model
- privacy protection
- biometric systems
- security policies
- personal information
- visual basic
- third party
- user experience
- protection schemes
- database systems