Persistent Link:
http://hdl.handle.net/10150/605052
Title:
Securing Telemetry Post Processing Applications with Hardware Based Security
Author:
Kalibjian, Jeff
Affiliation:
Hewlett Packard Corporation
Issue Date:
2004-10
Rights:
Copyright © International Foundation for Telemetering
Collection Information:
Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
Publisher:
International Foundation for Telemetering
Journal:
International Telemetering Conference Proceedings
Abstract:
The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
Keywords:
Hardware Security Modules (HSM); Hardware Security Module Hybrids (HSMH); Federal Processing Information Standard 140-2 (FIPS 140-2); Common Criteria (CC); security boundary; key management
Sponsors:
International Foundation for Telemetering
ISSN:
0884-5123; 0074-9079
Additional Links:
http://www.telemetry.org/

Full metadata record

DC FieldValue Language
dc.language.isoen_USen
dc.titleSecuring Telemetry Post Processing Applications with Hardware Based Securityen_US
dc.contributor.authorKalibjian, Jeffen
dc.contributor.departmentHewlett Packard Corporationen
dc.date.issued2004-10en
dc.rightsCopyright © International Foundation for Telemeteringen
dc.description.collectioninformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.en
dc.publisherInternational Foundation for Telemeteringen
dc.description.abstractThe use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.en
dc.subjectHardware Security Modules (HSM)en
dc.subjectHardware Security Module Hybrids (HSMH)en
dc.subjectFederal Processing Information Standard 140-2 (FIPS 140-2)en
dc.subjectCommon Criteria (CC)en
dc.subjectsecurity boundaryen
dc.subjectkey managementen
dc.description.sponsorshipInternational Foundation for Telemeteringen
dc.identifier.issn0884-5123en
dc.identifier.issn0074-9079en
dc.identifier.urihttp://hdl.handle.net/10150/605052en
dc.identifier.journalInternational Telemetering Conference Proceedingsen
dc.typetexten
dc.typeProceedingsen
dc.relation.urlhttp://www.telemetry.org/en
All Items in UA Campus Repository are protected by copyright, with all rights reserved, unless otherwise indicated.