%0 Conference Proceedings %T Capturing Policies for BYOD %+ University of Edinburgh (Edin.) %A Hallett, Joseph %A Aspinall, David %Z Part 5: User Authentication and Policies %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC) %C Rome, Italy %Y Sabrina De Capitani di Vimercati %Y Fabio Martinelli %I Springer International Publishing %3 ICT Systems Security and Privacy Protection %V AICT-502 %P 310-323 %8 2017-05-29 %D 2017 %R 10.1007/978-3-319-58469-0_21 %Z Computer Science [cs]Conference papers %X BYOD policies are informally specified using natural language. We show how the SP4BYOD language can help reduce ambiguity in 5 BYOD policies and link the specification of a BYOD policy to its implementation. Using a formalisation of the 5 policies written in SP4BYOD, we make comparisons between them, and explore the delegation relationships within them. We identify that whilst policy acknowledgement is a key part of all 5 policies, this is not managed by existing MDM tools. %G English %Z TC 11 %2 https://inria.hal.science/hal-01649006/document %2 https://inria.hal.science/hal-01649006/file/449885_1_En_21_Chapter.pdf %L hal-01649006 %U https://inria.hal.science/hal-01649006 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-SEC %~ IFIP-AICT-502