Paper
3 May 2012 Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications
Author Affiliations +
Abstract
Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Bassam Farroha and Deborah Farroha "Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications", Proc. SPIE 8405, Defense Transformation and Net-Centric Systems 2012, 840507 (3 May 2012); https://doi.org/10.1117/12.919611
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Mobile devices

Computer security

Network security

Information security

Clouds

Mobile communications

Operating systems

Back to Top