Paper
28 April 2010 Enterprise systems security management: a framework for breakthrough protection
Author Affiliations +
Abstract
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Bassam S. Farroha and Deborah L. Farroha "Enterprise systems security management: a framework for breakthrough protection", Proc. SPIE 7707, Defense Transformation and Net-Centric Systems 2010, 77070O (28 April 2010); https://doi.org/10.1117/12.850660
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Computer security

Clouds

Control systems

Network security

Homeland security

Data communications

Back to Top