Share Email Print

Proceedings Paper

Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.

Paper Details

Date Published: 3 May 2012
PDF: 13 pages
Proc. SPIE 8405, Defense Transformation and Net-Centric Systems 2012, 840507 (3 May 2012); doi: 10.1117/12.919611
Show Author Affiliations
Bassam Farroha, U.S. Dept. of Defense (United States)
Deborah Farroha, U.S. Dept. of Defense (United States)

Published in SPIE Proceedings Vol. 8405:
Defense Transformation and Net-Centric Systems 2012
Raja Suresh, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?