Share Email Print

Proceedings Paper

Access control within military C4ISR systems
Author(s): Mike Maschino
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

Paper Details

Date Published: 22 July 2003
PDF: 9 pages
Proc. SPIE 5101, Battlespace Digitization and Network-Centric Systems III, (22 July 2003); doi: 10.1117/12.487391
Show Author Affiliations
Mike Maschino, General Dynamics Decision Systems (United States)

Published in SPIE Proceedings Vol. 5101:
Battlespace Digitization and Network-Centric Systems III
Raja Suresh, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?