Authorization Boundary - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Authorization Boundary

The Experts below are selected from a list of 3 Experts worldwide ranked by ideXlab platform

Jameson Mbale – 1st expert on this subject based on the ideXlab platform

  • Telecom Namibia enterprise mobile architecture (TNEMA): Bring your own devices
    Internet of Things and Cloud Computing, 2014
    Co-Authors: Valerie Garises, Jameson Mbale

    Abstract:

    In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and Authorization, Boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security. In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).

Valerie Garises – 2nd expert on this subject based on the ideXlab platform

  • Telecom Namibia enterprise mobile architecture (TNEMA): Bring your own devices
    Internet of Things and Cloud Computing, 2014
    Co-Authors: Valerie Garises, Jameson Mbale

    Abstract:

    In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and Authorization, Boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security. In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).