Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions

Ayedh, Aljuaid Turkea M. and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna (2023) Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions. Applied Sciences-Basel, 13 (14). ISSN 2076-3417, DOI https://doi.org/10.3390/app13148048.

Full text not available from this repository.

Abstract

The number of devices connected within organisational networks through ``Bring Your Own Device'' (BYOD) initiatives has steadily increased. BYOD security risks have resulted in significant privacy and security issues impacting organisational security. Many researchers have reviewed security and privacy issues in BYOD policies. However, not all of them have fully investigated security and privacy requirements. In addition to describing a system's capabilities and functions, these requirements also reflect the system's ability to eliminate various threats. This paper aims to conduct a comprehensive review of privacy and security criteria in BYOD security policies, as well as the various technical policy methods used to mitigate these threats, to identify future research opportunities. This study reviews existing research and highlights the following points: (1) classification of privacy and security requirements in the context of BYOD policies; (2) comprehensive analyses of proposed state-of-the-art security policy technologies based on three layers of security BYOD policies, followed by analyses of these technologies in terms of the privacy requirements they satisfy; (3) technological trends; (4) measures employed to assess the efficacy of techniques to enhance privacy and security; and (5) future research in the area of BYOD security and privacy.

Item Type: Article
Funders: UNSPECIFIED
Uncontrolled Keywords: access control policies; security techniques; BYOD security layers; risk access control; onboarding access control; authentication; attack detection; privacy and security requirements; BYOD environment
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Ms. Juhaida Abd Rahim
Date Deposited: 07 Aug 2025 06:31
Last Modified: 07 Aug 2025 06:31
URI: http://eprints.um.edu.my/id/eprint/50731

Actions (login required)

View Item View Item