Context-Based Mobile Security Enclave
Carter, Joey C.
MetadataShow full item record
Currently, there are no secure access control methods of controlling restricted material access on a mobile device using context-based authentication methods. Simple challenge/response protocols do not provide the security required for some restricted information. A lost/misplaced device or compromised password can easily lead to the compromise of any restricted information to which the device may have access. Due to the inherent portability of a mobile device, a broader, more comprehensive set of access controls is required. This thesis will research and build a prototype application that will allow access to restricted information, stored on the device itself, based on a set of predefined contexts using the devices own hardware.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Thompson, Steven K. (Monterey, California: Naval Postgraduate School, 2017-06);The ability for Marines to access Global Combat Support System-Marine Corps (GCSS-MC) through mobile devices such as tablets and smart phones would greatly improve their productivity. Mobile device access to GCSS-MC would ...
Examination of retinal pattern threshold levels and their possible effect on computer access control mechanisms Helle, Debra K. (1985-09);The advent of multi-programming and the proliferation of shared computer systems has increased the need for greater computer security. Computer security can be segmented into six categories: physical, hardware, software, ...
LaFrenier, Kevin J. (Monterey, California. Naval Postgraduate School, 2011-09);There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain ...