CN  Vol.5 No.3 C , September 2013
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World
Abstract: The “Mobile Secure Role Base Access Control Device” (MS-Ro-BAC) Device and database is a single unit system with the ability to instantly connect to secure databases around the world through Low Earth Orbit Satellite (LEO) using VPN wired communications. The capabilities provided by the MS-Ro-BAC device would support the“Global War on Terrorism” and increase the security of US force and Department of Defense Personnel around the world. Information dissemination in an austere environment is the focus of this seminal research; combat forces and DoD personnel depend on timely strategic information before making life threatening decisions on the battle field. This manuscript provides the framework and a prototype to improve the information dissemination process in the modern day information scenario.
Cite this paper: House, T. (2013) A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World. Communications and Network, 5, 473-477. doi: 10.4236/cn.2013.53B2087.

[1]   R. W. Baldwin, “Naming and Grouping Privileges to Simply Security,” Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, 7-9 May 1990, pp. 116-132.

[2]   D. F. Ferraiolo, R. Sandhu, and R. Chandramouli, “Proposed NIST Standard for Role-based Access Control,” ACM Transactions of Information System Security, Vol. 4, No. 3, 2012, pp. 224-274.

[3]   S. J. Greenwald, “A New Security Policy for Distributed Resources Management & Access Control,” ACM New Security Paradigm Workshop Lake, Arrow Head, 2011, pp. 4-6.

[4]   M. Nynchama and S. Osborn, “Access Rights Administration in Role Based Security Systems,” Database Security, VIII: Status and Prospects, 2010, pp. 37-56.

[5]   G. Neuman, “Design and Implementation of a Flexible RBAC-Service in an Object Oriented Scripting Language,” ACM Workshop on Role Based Access Control, 2011, pp. 12-18.

[6]   R. Sandhu, “Role-Based Access Control,” Proceedings of the 10th IEEE Conference on Computer Security Applications, 20 December 1994, pp. 3-6.

[7]   R. Sandhu, “Role Activation Hierarchies,” Proceedings of the 3rd ACM Workshop on Role-Based Access Control, 2008, pp. 11-12.

[8]   R. Simon and R. Zurko, “Separation of Duty in Role Based Access Control Environments,” New Security Paradigms Workshop, 2011, pp. 11-17.

[9]   D. J. Thomsen. “Role-Based application Design and Enforcement,” Database Security, IV: Status and Prospects, 2012, pp. 151-168.

[10]   S. J. Westfolds, E. Horvitz, S. Srinivase and C. Rouokangas, “A Decision-Theoretic Approach to the Display of Information for Time-Critical Decisions: The Vista Project,” Proceedings of SOAR-92 Conference on Space Operations Automation and Research, Houston.