Securing Print Services for Telemetry Post-Processing Applications
AffiliationHewlett Packard Corporation
secure print management server
secure print policy
MetadataShow full item record
RightsCopyright © International Foundation for Telemetering
Collection InformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
AbstractOne of the primary goals of telemetry post processing is to format received data for review and analysis. This occurs by both displaying processed data on video monitors and by printing out the results to hardcopy media. Controlling access (i.e. viewing) of telemetry data in soft form (i.e. video monitor) is achieved by utilizing the existing framework of authentication and authorization on the client/server machines hosting the telemetry data (and post processing applications). Controlling access to hardcopy output has historically been much more problematic. This paper discusses how to implement secure printing services for telemetry post processing applications.
SponsorsInternational Foundation for Telemetering
Showing items related by title, author, creator and subject.
Securing Telemetry Post Processing Applications with Hardware Based SecurityKalibjian, Jeff; Hewlett Packard Corporation (International Foundation for Telemetering, 2004-10)The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line BankingBongani Ngwenya; Khanyisa Malufu; Dean, faculty of Business, Solusi University Bulawayo, +263, Zimbabwe; Department of Computers and Information Systems Solusi University, Bulawayo, +263, Zimbabwe (IJCSN, 2012-12-01)The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The researcher chose a descriptive-quantitative research design. Data was collected using a self constructed questionnaire. Convenience sampling and stratified random sampling techniques were used to select the main subjects of the study. Generally on average there was no significant difference between the perceptions of management bank personnel and non-management bank personnel on the security of on-line banking. The study recommends further future studies on the security of on-line banking in developing countries based on the perceptions of the customers themselves, who are using on-line banking services, the Common Criteria for Information Technology Security and also a study of the latent dimensions of on-line banking security as extracted by factor analysis, how they differ from elements of information security as derived from the theoretical framework and literature.
The Rational Design of Security Institutions: Effects of Institutional Design on Institutional PerformanceTandon, Aakriti A. (The University of Arizona., 2012)Based on the assumption that security institutions are designed rationally, I study the variations in design schemes and their possible effects on institutional performance. Military alliances vary with respect to their membership size, level of security obligations undertaken by the allies, incorporation of non security clauses such as economic agreements, level of institutionalization, specified duration of existence, as well as the conditions under and reasons for which they are formed. This dissertation studies the effects of above mentioned design features on the probability of security alliances expanding their scope by addressing non-security agreements such as free trade agreements and conflict management clauses. I find support for the argument that states include economic agreements within a military alliance as a means to bolster the credibility of an otherwise weak security alliance. Results indicate that allies facing high levels of external threat and low levels of intra alliance cohesion are more likely to include conflict management provisions in the alliance. Finally, I conduct a systematic study of the possible effects of variation in structural design on the durability of an alliance. I find that design features that increase the costs of breaking the alliance increase the duration of an alliance.