Share Email Print

Proceedings Paper

Agile enterprise development framework utilizing services principles for building pervasive security
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

We are in an environment of continuously changing mission requirements and therefore our Information Systems must adapt to accomplish new tasks, quicker, in a more proficient manner. Agility is the only way we will be able to keep up with this change. But there are subtleties that must be considered as we adopt various agile methods: secure, protect, control and authenticate are all elements needed to posture our Information Technology systems to counteract the real and perceived threats in today's environment. Many systems have been tasked to ingest process and analyze different data sets than they were originally designed for and they have to interact with multiple new systems that were unaccounted for at design time. Leveraging the tenets of security, we have devised a new framework that takes agility into a new realm where the product will built to work in a service-based environment but is developed using agile processes. Even though these two criteria promise to hone the development effort, they actually contradict each other in philosophy where Services require stable interfaces, while Agile focuses on being flexible and tolerate changes up to much later stages of development. This framework is focused on enabling a successful product development that capitalizes on both philosophies.

Paper Details

Date Published: 23 May 2011
PDF: 14 pages
Proc. SPIE 8062, Defense Transformation and Net-Centric Systems 2011, 80620S (23 May 2011); doi: 10.1117/12.885180
Show Author Affiliations
Deborah Farroha, U.S. Dept. of Defense (United States)
Bassam Farroha, U.S. Dept. of Defense (United States)

Published in SPIE Proceedings Vol. 8062:
Defense Transformation and Net-Centric Systems 2011
Raja Suresh, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?