Abstract
Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model that can be used as a roadmap for improving their security. Additionally, several shortcomings of the data-centric approach are discussed.
Original language | Undefined |
---|---|
Article number | 10.1016/j.istr.2008.10.003 |
Pages (from-to) | 112-117 |
Number of pages | 6 |
Journal | Information security technical report |
Volume | 13 |
Issue number | 3 |
DOIs | |
Publication status | Published - Aug 2008 |
Keywords
- METIS-255959
- IR-62584
- EWI-14334