Securing Print Services for Telemetry Post-Processing Applications
AffiliationHewlett Packard Corporation
secure print management server
secure print policy
MetadataShow full item record
RightsCopyright © International Foundation for Telemetering
Collection InformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
AbstractOne of the primary goals of telemetry post processing is to format received data for review and analysis. This occurs by both displaying processed data on video monitors and by printing out the results to hardcopy media. Controlling access (i.e. viewing) of telemetry data in soft form (i.e. video monitor) is achieved by utilizing the existing framework of authentication and authorization on the client/server machines hosting the telemetry data (and post processing applications). Controlling access to hardcopy output has historically been much more problematic. This paper discusses how to implement secure printing services for telemetry post processing applications.
SponsorsInternational Foundation for Telemetering
Showing items related by title, author, creator and subject.
Securing Telemetry Post Processing Applications with Hardware Based SecurityKalibjian, Jeff; Hewlett Packard Corporation (International Foundation for Telemetering, 2004-10)The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line BankingBongani Ngwenya; Khanyisa Malufu; Dean, faculty of Business, Solusi University Bulawayo, +263, Zimbabwe; Department of Computers and Information Systems Solusi University, Bulawayo, +263, Zimbabwe (IJCSN, 2012-12-01)The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The researcher chose a descriptive-quantitative research design. Data was collected using a self constructed questionnaire. Convenience sampling and stratified random sampling techniques were used to select the main subjects of the study. Generally on average there was no significant difference between the perceptions of management bank personnel and non-management bank personnel on the security of on-line banking. The study recommends further future studies on the security of on-line banking in developing countries based on the perceptions of the customers themselves, who are using on-line banking services, the Common Criteria for Information Technology Security and also a study of the latent dimensions of on-line banking security as extracted by factor analysis, how they differ from elements of information security as derived from the theoretical framework and literature.
"Big Data" Management and Security Application to Telemetry Data ProductsKalibjian, Jeff; Hewlett Packard Corporation (International Foundation for Telemetering, 2013-10)"Big Data"  and the security challenge of managing "Big Data" is a hot topic in the IT world. The term "Big Data" is used to describe very large data sets that cannot be processed by traditional database applications in "tractable" periods of time. Securing data in a conventional database is challenge enough; securing data whose size may exceed hundreds of terabytes or even petabytes is even more daunting! As the size of telemetry product and telemetry post-processed product continues to grow, "Big Data" management techniques and the securing of that data may have ever increasing application in the telemetry realm. After reviewing "Big Data", "Big Data" security and management basics, potential application to telemetry post-processed product will be explored.