
Proceedings Paper
Enterprise systems security management: a framework for breakthrough protectionFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of
network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver
capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic
requirements for secure information sharing in a net-centric environment. We introduce many of the new technology
components to secure the enterprise. The cooperative mission requirements lead to developing automatic data
discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple
architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public
Clouds.
Paper Details
Date Published: 28 April 2010
PDF: 12 pages
Proc. SPIE 7707, Defense Transformation and Net-Centric Systems 2010, 77070O (28 April 2010); doi: 10.1117/12.850660
Published in SPIE Proceedings Vol. 7707:
Defense Transformation and Net-Centric Systems 2010
Raja Suresh, Editor(s)
PDF: 12 pages
Proc. SPIE 7707, Defense Transformation and Net-Centric Systems 2010, 77070O (28 April 2010); doi: 10.1117/12.850660
Show Author Affiliations
Bassam S. Farroha, TASC, Inc. (United States)
Deborah L. Farroha, U.S. Dept. of Defense (United States)
Published in SPIE Proceedings Vol. 7707:
Defense Transformation and Net-Centric Systems 2010
Raja Suresh, Editor(s)
© SPIE. Terms of Use
