SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES
Brooks, Jason L.
Goss, Jason A.
MetadataShow full item record
Mobile devices, given their promise of mobility with rich functionality, are being deployed with broadening use cases throughout the United States Department of Defense. All the while, massive quantities of information are stored and accessed by these devices without there being a comprehensive and specialized security policy dedicated to protecting that information. The importance of having a security policy grows as these devices start providing new capabilities and replacing many information systems we currently have deployed. Since the same device will be used in many different contexts, each with potentially different security policies, the devices will have to be able to adapt to those contexts. The security policy(ies) enforced by the device will have to adapt accordingly. We investigate potential mobile computing security policies to balance this request for context aware functionality with the information assurance required of these government devices. We investigate the security issues raised in the use of these devices and provide example security policies that address some of these issues.
Showing items related by title, author, creator and subject.
Martin, Jeremy; Rye, Erik; Beverly, Robert (2016-12);Common among the wide variety of ubiquitous networked devices in modern use is wireless 802.11 connectivity. The MAC addresses of these devices are visible to a passive adversary, thereby presenting security and privacy ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2011);10 Years After: the 9/11 Essays. Homeland Security Affairs (HSA) is pleased to present this special collection of essays in remembrance of the ten-year anniversary of September 11, 2001. We chose to honor those who lost ...
Stone, Gary; Lundy, Bert; Xie, Geoffrey (Monterey, California. Naval Postgraduate School, 2000-08); NPS-CS-00-003In this report a survey of current network policy languages is presented. Next, a summary of the techniques for detecting policy conflicts is given. Finally, a new language, Path-based Policy Language (PPL), which offers ...