• Login
    View Item 
    •   Home
    • Conference Proceedings
    • International Telemetering Conference
    • International Telemetering Conference Proceedings, Volume 40 (2004)
    • View Item
    •   Home
    • Conference Proceedings
    • International Telemetering Conference
    • International Telemetering Conference Proceedings, Volume 40 (2004)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UA Campus RepositoryCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournal

    My Account

    LoginRegister

    About

    AboutUA Faculty PublicationsUA DissertationsUA Master's ThesesUA Honors ThesesUA PressUA YearbooksUA CatalogsUA Libraries

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Securing Telemetry Post Processing Applications with Hardware Based Security

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    ITC_2004_04-15-02.pdf
    Size:
    35.18Kb
    Format:
    PDF
    Download
    Author
    Kalibjian, Jeff
    Affiliation
    Hewlett Packard Corporation
    Issue Date
    2004-10
    Keywords
    Hardware Security Modules (HSM)
    Hardware Security Module Hybrids (HSMH)
    Federal Processing Information Standard 140-2 (FIPS 140-2)
    Common Criteria (CC)
    security boundary
    key management
    
    Metadata
    Show full item record
    Rights
    Copyright © International Foundation for Telemetering
    Collection Information
    Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
    Publisher
    International Foundation for Telemetering
    Journal
    International Telemetering Conference Proceedings
    Abstract
    The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
    Sponsors
    International Foundation for Telemetering
    ISSN
    0884-5123
    0074-9079
    Additional Links
    http://www.telemetry.org/
    Collections
    International Telemetering Conference Proceedings, Volume 40 (2004)

    entitlement

     

    Related items

    Showing items related by title, author, creator and subject.

    • Thumbnail

      Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line Banking

      Bongani Ngwenya; Khanyisa Malufu; Dean, faculty of Business, Solusi University Bulawayo, +263, Zimbabwe; Department of Computers and Information Systems Solusi University, Bulawayo, +263, Zimbabwe (IJCSN, 2012-12-01)
      The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The researcher chose a descriptive-quantitative research design. Data was collected using a self constructed questionnaire. Convenience sampling and stratified random sampling techniques were used to select the main subjects of the study. Generally on average there was no significant difference between the perceptions of management bank personnel and non-management bank personnel on the security of on-line banking. The study recommends further future studies on the security of on-line banking in developing countries based on the perceptions of the customers themselves, who are using on-line banking services, the Common Criteria for Information Technology Security and also a study of the latent dimensions of on-line banking security as extracted by factor analysis, how they differ from elements of information security as derived from the theoretical framework and literature.
    • Thumbnail

      "Big Data" Management and Security Application to Telemetry Data Products

      Kalibjian, Jeff; Hewlett Packard Corporation (International Foundation for Telemetering, 2013-10)
      "Big Data" [1] and the security challenge of managing "Big Data" is a hot topic in the IT world. The term "Big Data" is used to describe very large data sets that cannot be processed by traditional database applications in "tractable" periods of time. Securing data in a conventional database is challenge enough; securing data whose size may exceed hundreds of terabytes or even petabytes is even more daunting! As the size of telemetry product and telemetry post-processed product continues to grow, "Big Data" management techniques and the securing of that data may have ever increasing application in the telemetry realm. After reviewing "Big Data", "Big Data" security and management basics, potential application to telemetry post-processed product will be explored.
    • Thumbnail

      Engendered Security: Norms, Gender and Peace Agreements

      Goertz, Gary; Ellerby, Kara; Peterson, V. Spike; Ghosn, Faten; Dovi, Suzanne; Goertz, Gary (The University of Arizona., 2011)
      As civil conflicts continue to be the most prevalent form of war, women and children are disproportionately affected by intrastate violence. In response to such findings, the United Nations, at the behest of a transitional activist network, passed United Nations Security Council Resolution 1325, which outlined how to include more women in formal security practices.Because of the normative qualities of the Resolution, I employ a norms framework to explore the properties and evolution of when and how women are part of peace agreements. Before exploring the norm of engendered security, I present a review of feminist security studies and how engendered security is understood using a gender lens. To first establish what a norm is, I developed a three-level approach which illuminates the principles, properties and policies that constitute a norm; I then apply this model to the norm of engendered security. I then use this norm to study peace agreements, and develop graphs and tables illustrating the varied levels of engendered security in different peace processes.Then, to address the ways in which this norm has evolved, I employ a norm lifecycle model which includes four stages: innovation, emergence, enactment and routinization. Subsequent chapters explore the first three phases of engendered security's development into a norm. This includes a discussion of Guatemala as a norm innovator, in which a strong domestic women's movement and feminist leaders promoted a high level of engendered security in their peace process. Norm emergence focuses on the agenda-setting of a Peacewomen's Network who promoted Resolution 1325; it includes an analysis of the developing discourses of security and women, culminating in global recognition of women's insecurity in conflict. The final chapter explores norm enactment and the ways in which norms become common practices and policies in various security-related institutions. This chapter concludes with a study of Sudan's two peace processes and the role the international community played in producing very different levels of engendered security.Ultimately, the views of leaders during peace processes, the presence of an organized women's movement and agenda and gender-conscious mediators seem to account for higher levels of engendered security.
    The University of Arizona Libraries | 1510 E. University Blvd. | Tucson, AZ 85721-0055
    Tel 520-621-6442 | repository@u.library.arizona.edu
    DSpace software copyright © 2002-2017  DuraSpace
    Quick Guide | Contact Us | Send Feedback
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.