A systematic review of Bring Your Own Device (BYOD) authentication technique
This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The rev...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IOP Publishing
2020
|
Online Access: | http://psasir.upm.edu.my/id/eprint/87730/1/ABSTRACT.pdf |
_version_ | 1796981882246660096 |
---|---|
author | Jamal, Fara Abdullah@Selimun, Mohd. Taufik Abdullah, Azizol Mohd. Hanapi, Zurina |
author_facet | Jamal, Fara Abdullah@Selimun, Mohd. Taufik Abdullah, Azizol Mohd. Hanapi, Zurina |
author_sort | Jamal, Fara |
collection | UPM |
description | This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The review result shows that there are 25 authentication techniques proposed across both industry and academic areas to fit into BYOD implementation to enhance the security in preventing and detecting data leakage in the organization. It is hoped that the proposed BYOD authentication solution can help organizations to minimize the number of cases in data leakage while allowing the BYOD concept. |
first_indexed | 2024-03-06T10:44:09Z |
format | Article |
id | upm.eprints-87730 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-03-06T10:44:09Z |
publishDate | 2020 |
publisher | IOP Publishing |
record_format | dspace |
spelling | upm.eprints-877302022-07-06T03:25:39Z http://psasir.upm.edu.my/id/eprint/87730/ A systematic review of Bring Your Own Device (BYOD) authentication technique Jamal, Fara Abdullah@Selimun, Mohd. Taufik Abdullah, Azizol Mohd. Hanapi, Zurina This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The review result shows that there are 25 authentication techniques proposed across both industry and academic areas to fit into BYOD implementation to enhance the security in preventing and detecting data leakage in the organization. It is hoped that the proposed BYOD authentication solution can help organizations to minimize the number of cases in data leakage while allowing the BYOD concept. IOP Publishing 2020 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/87730/1/ABSTRACT.pdf Jamal, Fara and Abdullah@Selimun, Mohd. Taufik and Abdullah, Azizol and Mohd. Hanapi, Zurina (2020) A systematic review of Bring Your Own Device (BYOD) authentication technique. Journal of Physics: Conference Series, 1529. art. no. 042071. pp. 1-11. ISSN 1742-6588; ESSN: 1742-6596 https://iopscience.iop.org/article/10.1088/1742-6596/1529/4/042071 10.1088/1742-6596/1529/4/042071 |
spellingShingle | Jamal, Fara Abdullah@Selimun, Mohd. Taufik Abdullah, Azizol Mohd. Hanapi, Zurina A systematic review of Bring Your Own Device (BYOD) authentication technique |
title | A systematic review of Bring Your Own Device (BYOD) authentication technique |
title_full | A systematic review of Bring Your Own Device (BYOD) authentication technique |
title_fullStr | A systematic review of Bring Your Own Device (BYOD) authentication technique |
title_full_unstemmed | A systematic review of Bring Your Own Device (BYOD) authentication technique |
title_short | A systematic review of Bring Your Own Device (BYOD) authentication technique |
title_sort | systematic review of bring your own device byod authentication technique |
url | http://psasir.upm.edu.my/id/eprint/87730/1/ABSTRACT.pdf |
work_keys_str_mv | AT jamalfara asystematicreviewofbringyourowndevicebyodauthenticationtechnique AT abdullahselimunmohdtaufik asystematicreviewofbringyourowndevicebyodauthenticationtechnique AT abdullahazizol asystematicreviewofbringyourowndevicebyodauthenticationtechnique AT mohdhanapizurina asystematicreviewofbringyourowndevicebyodauthenticationtechnique AT jamalfara systematicreviewofbringyourowndevicebyodauthenticationtechnique AT abdullahselimunmohdtaufik systematicreviewofbringyourowndevicebyodauthenticationtechnique AT abdullahazizol systematicreviewofbringyourowndevicebyodauthenticationtechnique AT mohdhanapizurina systematicreviewofbringyourowndevicebyodauthenticationtechnique |