Proceedings Volume 8754

Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013

cover
Proceedings Volume 8754

Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013

View the digital version of this volume at SPIE Digital Libarary.

Volume Details

Date Published: 20 June 2013
Contents: 3 Sessions, 5 Papers, 0 Presentations
Conference: SPIE Defense, Security, and Sensing 2013
Volume Number: 8754

Table of Contents

icon_mobile_dropdown

Table of Contents

All links to SPIE Proceedings will open in the SPIE Digital Library. external link icon
View Session icon_mobile_dropdown
  • Front Matter: Volume 8754
  • Perspectives on Open Architecture/Open Business Model (OA/OBM) Systems
  • Net-centric Architectures and Information Assurance
Front Matter: Volume 8754
icon_mobile_dropdown
Front Matter: Volume 8754
This PDF file contains the front matter associated with SPIE Proceedings Volume 8754 including the Title Page, Copyright information, Table of Contents, Introduction, and Conference Committee listing.
Perspectives on Open Architecture/Open Business Model (OA/OBM) Systems
icon_mobile_dropdown
Naval open systems architecture
Nick Guertin, Brian Womble, Virginia Haskell
For the past 8 years, the Navy has been working on transforming the acquisition practices of the Navy and Marine Corps toward Open Systems Architectures to open up our business, gain competitive advantage, improve warfighter performance, speed innovation to the fleet and deliver superior capability to the warfighter within a shrinking budget1. Why should Industry care? They should care because we in Government want the best Industry has to offer. Industry is in the business of pushing technology to greater and greater capabilities through innovation. Examples of innovations are on full display at this conference, such as exploring the impact of difficult environmental conditions on technical performance. Industry is creating the tools which will continue to give the Navy and Marine Corps important tactical advantages over our adversaries.
The UAS control segment architecture: an overview
Douglas A. Gregory, Parag Batavia, Mark Coats, et al.
The Under Secretary of Defense (Acquisition, Technology and Logistics) directed the Services in 2009 to jointly develop and demonstrate a common architecture for command and control of Department of Defense (DoD) Unmanned Aircraft Systems (UAS) Groups 2 through 5. The UAS Control Segment (UCS) Architecture is an architecture framework for specifying and designing the softwareintensive capabilities of current and emerging UCS systems in the DoD inventory. The UCS Architecture is based on Service Oriented Architecture (SOA) principles that will be adopted by each of the Services as a common basis for acquiring, integrating, and extending the capabilities of the UAS Control Segment. The UAS Task Force established the UCS Working Group to develop and support the UCS Architecture. The Working Group currently has over three hundred members, and is open to qualified representatives from DoD-approved defense contractors, academia, and the Government. The UCS Architecture is currently at Release 2.2, with Release 3.0 planned for July 2013. This paper discusses the current and planned elements of the UCS Architecture, and related activities of the UCS Community of Interest.
A model for open architecture mission control systems
Timothy J. Pavlick
A model is described which provides a theoretical underpinning open systems view of Mission Control. Various Facets of the open ecosystem approach are described as are their interactions. A hypothesis is put forward that Mission Control flexibility is best achieved not by vertically integrated systems but through a new model which tracks the IT industry’s evolution.
Net-centric Architectures and Information Assurance
icon_mobile_dropdown
Evaluating encrypted Boolean functions on encrypted bits: secure decision-making on the black side
Rajesh Krishnan, Ravi Sundaram
We present a novel approach for secure evaluation of encrypted Boolean functions on encrypted bits. Building upon Barrington’s work to transform circuits to group programs and the Feige-Kilian-Naor cryptographic protocol, our novel Fixed Structure Group Program construction for secure evaluation eliminates the need for an expensive Universal Circuit to hide the function. Elements on the Black side weave together and multiply two coordinated streams of random sequences of elements from an unsolvable group; the Boolean decision is recovered while preserving the confidentiality of the decision function and the input bits. The operation is fast and can be further sped up using parallel computation. Our approach can handle expressions with NC1 complexity, which is the class of Acyclic Boolean Circuits with polynomial width and logarithmic depth in the size of the input. This efficiently parallelizable class includes nonmonotone Boolean expressions of equality, inequality/range, Hamming distance, Boolean matrix multiplication, and kof- m threshold matching operations. The combined benefits of scaling and expressivity of our approach enables secure decision-making on the Black side. Envisioned applications include confidential publish/subscribe systems (with empirically validated performance), secure content-oriented internetworks, confidential forwarding and firewalling rules, and cross-domain guards.