DocumentCode :
2976812
Title :
Cryptographic solutions for COTS smart phones
Author :
Buibish, Anne-Marie ; Johnson, Noel E. ; Emery, David ; Prudlow, Michael
Author_Institution :
Raytheon Network Centric Syst., Fort Wayne, IN, USA
fYear :
2011
fDate :
7-10 Nov. 2011
Firstpage :
1434
Lastpage :
1439
Abstract :
The ability of Commercial Off-The-Shelf (COTS) smart phones to securely process classified voice and data greatly depends on several factors - operational context, highest classification level of security processing required, and application of the relevant Information Assurance (IA) standards. This paper will describe the unique challenges associated with use of COTS smart phones in military operations. Three loss scenarios are described along with corresponding loss mitigation strategies. In addition, the paper will offer ideas that can turn the loss scenario into an opportunity to collect intelligence on the enemy. In conclusion, we propose the next steps required to provide Cryptographic Solutions for COTS Smart Phones.
Keywords :
cryptography; smart phones; telecommunication security; COTS smart phones; commercial off-the-shelf; cryptographic solutions; information assurance standards; Authentication; Encryption; Kernel; Smart phones; COTS; Cryptographic; Security; Smart Phone;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011
Conference_Location :
Baltimore, MD
ISSN :
2155-7578
Print_ISBN :
978-1-4673-0079-7
Type :
conf
DOI :
10.1109/MILCOM.2011.6127508
Filename :
6127508
Link To Document :
بازگشت