28 April 2010 Enterprise systems security management: a framework for breakthrough protection
Author Affiliations +
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Bassam S. Farroha, Bassam S. Farroha, Deborah L. Farroha, Deborah L. Farroha, } "Enterprise systems security management: a framework for breakthrough protection", Proc. SPIE 7707, Defense Transformation and Net-Centric Systems 2010, 77070O (28 April 2010); doi: 10.1117/12.850660; https://doi.org/10.1117/12.850660


Back to Top