International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Today many organizations use the Secure Sockets Layer protocol (SSL, now known as TLS, or Transport Layer Security) to secure post processed telemetry data transmitted over internal or external Internet Protocol (IP) networks. While TLS secures data traveling over a network, it does not protect data after it reaches its end point. In the Open Systems Interconnection (OSI) layer model, TLS falls several layers below the application category. This implies that applications utilizing data delivered by TLS have no way of evaluating whether data has been compromised before TLS encryption (from a source), or after TLS decryption (at the destination). This security “gap” can be addressed by adoption of a security infrastructure that allows security operations to be abstracted at an OSI application level.
Identifer | oai:union.ndltd.org:arizona.edu/oai:arizona.openrepository.com:10150/606667 |
Date | 10 1900 |
Creators | Kalibjian, Jeffrey R. |
Contributors | Hewlett Packard Corporation |
Publisher | International Foundation for Telemetering |
Source Sets | University of Arizona |
Language | en_US |
Detected Language | English |
Type | text, Proceedings |
Rights | Copyright © International Foundation for Telemetering |
Relation | http://www.telemetry.org/ |
Page generated in 0.0023 seconds