TY - JOUR AU - Farroha, Deborah AB - Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity. TI - Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications JF - Proceedings of SPIE DO - 10.1117/12.919611 DA - 2012-04-24 UR - https://www.deepdyve.com/lp/spie/overcoming-the-challenges-of-secure-mobile-applications-for-network-if47fAMmYR SP - 840507 EP - 840507-13 VL - 8405 IS - 1 DP - DeepDyve ER -