Share Email Print

Proceedings Paper

Enterprise systems security management: a framework for breakthrough protection
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.

Paper Details

Date Published: 28 April 2010
PDF: 12 pages
Proc. SPIE 7707, Defense Transformation and Net-Centric Systems 2010, 77070O (28 April 2010); doi: 10.1117/12.850660
Show Author Affiliations
Bassam S. Farroha, TASC, Inc. (United States)
Deborah L. Farroha, U.S. Dept. of Defense (United States)

Published in SPIE Proceedings Vol. 7707:
Defense Transformation and Net-Centric Systems 2010
Raja Suresh, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?