Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters.
Gabriel Salles-LoustauVidyasagar SadhuLuis GarciaKaustubh JoshiDario PompiliSaman A. ZonouzPublished in: IEEE Trans. Mob. Comput. (2022)
Keyphrases
- information security
- security level
- security architecture
- protection mechanisms
- protection scheme
- network security
- security issues
- virtual reality
- critical infrastructure
- intrusion detection
- individual privacy
- data protection
- access control
- computer security
- augmented reality
- statistical databases
- virtual environment
- security requirements
- security policies
- security mechanisms
- previously mentioned
- biometric template
- data security
- sensitive data
- secret key
- data confidentiality
- web applications
- privacy protection
- social networking
- third party
- e government
- user interface