PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013, 875401 (2013) https://doi.org/10.1117/12.2032075
This PDF file contains the front matter associated with SPIE Proceedings Volume 8754 including the Title Page, Copyright information, Table of Contents, Introduction, and Conference Committee listing.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Perspectives on Open Architecture/Open Business Model (OA/OBM) Systems
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013, 875402 (2013) https://doi.org/10.1117/12.2019832
For the past 8 years, the Navy has been working on transforming the acquisition practices of the Navy and
Marine Corps toward Open Systems Architectures to open up our business, gain competitive advantage,
improve warfighter performance, speed innovation to the fleet and deliver superior capability to the
warfighter within a shrinking budget1.
Why should Industry care? They should care because we in Government want the best Industry has to
offer. Industry is in the business of pushing technology to greater and greater capabilities through
innovation. Examples of innovations are on full display at this conference, such as exploring the impact
of difficult environmental conditions on technical performance. Industry is creating the tools which will
continue to give the Navy and Marine Corps important tactical advantages over our adversaries.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013, 875404 (2013) https://doi.org/10.1117/12.2019836
The Under Secretary of Defense (Acquisition, Technology and Logistics) directed the Services in 2009 to jointly
develop and demonstrate a common architecture for command and control of Department of Defense (DoD) Unmanned
Aircraft Systems (UAS) Groups 2 through 5.
The UAS Control Segment (UCS) Architecture is an architecture framework for specifying and designing the softwareintensive
capabilities of current and emerging UCS systems in the DoD inventory. The UCS Architecture is based on
Service Oriented Architecture (SOA) principles that will be adopted by each of the Services as a common basis for
acquiring, integrating, and extending the capabilities of the UAS Control Segment.
The UAS Task Force established the UCS Working Group to develop and support the UCS Architecture. The Working
Group currently has over three hundred members, and is open to qualified representatives from DoD-approved defense
contractors, academia, and the Government. The UCS Architecture is currently at Release 2.2, with Release 3.0 planned
for July 2013. This paper discusses the current and planned elements of the UCS Architecture, and related activities of
the UCS Community of Interest.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013, 875406 (2013) https://doi.org/10.1117/12.2019840
A model is described which provides a theoretical underpinning open systems view of Mission Control. Various Facets
of the open ecosystem approach are described as are their interactions. A hypothesis is put forward that Mission Control
flexibility is best achieved not by vertically integrated systems but through a new model which tracks the IT industry’s
evolution.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Net-centric Architectures and Information Assurance
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013, 875409 (2013) https://doi.org/10.1117/12.2018574
We present a novel approach for secure evaluation of encrypted Boolean functions on encrypted bits. Building upon
Barrington’s work to transform circuits to group programs and the Feige-Kilian-Naor cryptographic protocol, our novel
Fixed Structure Group Program construction for secure evaluation eliminates the need for an expensive Universal Circuit
to hide the function. Elements on the Black side weave together and multiply two coordinated streams of random
sequences of elements from an unsolvable group; the Boolean decision is recovered while preserving the confidentiality
of the decision function and the input bits. The operation is fast and can be further sped up using parallel computation.
Our approach can handle expressions with NC1 complexity, which is the class of Acyclic Boolean Circuits with
polynomial width and logarithmic depth in the size of the input. This efficiently parallelizable class includes nonmonotone
Boolean expressions of equality, inequality/range, Hamming distance, Boolean matrix multiplication, and kof-
m threshold matching operations. The combined benefits of scaling and expressivity of our approach enables secure
decision-making on the Black side. Envisioned applications include confidential publish/subscribe systems (with
empirically validated performance), secure content-oriented internetworks, confidential forwarding and firewalling rules,
and cross-domain guards.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.