Data for geofencing security strategy model.

Show simple item record

dc.contributor.author Ijeh, Anthony .C.
dc.contributor.author Preston, David .S.
dc.contributor.author Imafidon, Chris .O.
dc.contributor.author Watmon, Titus .B.
dc.contributor.author Arreymbi, Johnnes
dc.contributor.author Uwaechie, Annette .O.
dc.date.accessioned 2021-11-26T09:10:37Z
dc.date.available 2021-11-26T09:10:37Z
dc.date.issued 2010-03
dc.identifier.citation Ijeh, Anthony C. . . . [et al.] (2010). Data for geofencing security strategy model. Proceedings of the international multiconference of engineers and computer sciences 2010 Vol. I, IMECS. en_US
dc.identifier.uri http://hdl.handle.net/20.500.12283/822
dc.description Article en_US
dc.description.abstract The goal of this paper is to present the data results from the live implementation of a Geofencing Security Strategy Model that mitigates the threats to the information security of businesses which use Wireless Networks. The Geofencing Security Strategy Model is made up of Location Based Service Trust Model and a Security Strategy Trust Model. The results suggest that the Geofencing Security Strategy Model enhances the ability of a business to control the access of its wireless network users; by limiting the geographic range from which they can log onto the wireless network using a predefined parameter. Index Terms—Location Based Service Model, Security, Strategy Model, Geofencing as a Security Strategy Model, Data en_US
dc.description.sponsorship University of East London, Busitema University en_US
dc.language.iso en en_US
dc.publisher IAENG en_US
dc.subject Location Based Service Model en_US
dc.subject Security en_US
dc.subject Strategy Model en_US
dc.subject Geofencing as a Security Strategy Model en_US
dc.subject Data en_US
dc.title Data for geofencing security strategy model. en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BUOADIR


Browse

My Account