TACTICS: Validation of the security framework developed for tactical SOA

被引:1
|
作者
Gkioulos, Vasileios [1 ]
Risthein, Erko [1 ]
Wolthusen, Stephen D. [1 ]
机构
[1] Norwegian Univ Sci & Technol, Norwegian Informat Secur Lab, Trondheim, Norway
关键词
Ad-hoc; Security; Service oriented architectures; Tactical networks; Tactical service infrastructure;
D O I
10.1016/j.jisa.2017.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary military networks and the requirements arising from future strategic planning, call for the increasing integration of information mobility and network enabled capabilities on the field. Therefore, adopting Service Oriented Architecture (SOA) concepts for the development of command and control infrastructures have become essential, since they provide modularity, flexibility and interoperability of services. Nevertheless, constraints related to infrastructure and operational aspects, render current enterprise SOA ineffective for the tactical domain. Accordingly, the goal of TACTICS was the definition and experimental demonstration of a Tactical Services Infrastructure (TSI) that enables contemporary tactical radio equipment to participate in SOA, providing the required functionalities under the imposed constraints. This article presents a comprehensive view of the developed architecture, focusing on the elements that constitute the security framework according to our closing experimental results and field demonstrations. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:96 / 105
页数:10
相关论文
共 50 条
  • [21] Security as a Service - A Reference Architecture for SOA Security
    Memon, Mukhtiar
    Hafner, Michael
    Breu, Ruth
    [J]. SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 79 - 89
  • [22] Tactics Development Framework
    Evertsz, Rick
    Thangarajah, John
    Yadav, Nitin
    Thanh Ly
    [J]. AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2014, : 1639 - 1640
  • [23] SOA Web Security and Applications
    Wu, Raymond
    Hisada, Masayuki
    [J]. JOURNAL OF OBJECT TECHNOLOGY, 2010, 9 (02): : 163 - 171
  • [24] Revisiting Architectural Tactics for Security
    Fernandez, Eduardo B.
    Astudillo, Hernan
    Pedraza-Garcia, Gilberto
    [J]. SOFTWARE ARCHITECTURE (ECSA 2015), 2015, 9278 : 55 - 69
  • [25] Tactics of the Numerically Inferior Party: An Examination of Finnish Tactical Thinking
    Tuunainen, Pasi
    [J]. INTERNATIONAL JOURNAL OF MILITARY HISTORY AND HISTORIOGRAPHY, 2020, 40 (02) : 312 - 314
  • [26] Optimization of Tactical Aircraft Weapon Delivery using Tactics Templates
    Wang, Nan
    Zhang, Wanpeng
    Zhang, Chaojie
    Chen, Jing
    Shen, Lincheng
    [J]. 2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 21 - 27
  • [27] Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy
    Hu, J.
    Khalil, I.
    Han, S.
    Mahmood, A.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1150 - 1159
  • [28] A Methodology for Mining Security Tactics from Security Patterns
    Ryoo, Jungwoo
    Laplante, Phil
    Kazman, Rick
    [J]. 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 875 - 879
  • [29] Defense and security of a wireless tactical network
    Younger, M
    Young, S
    [J]. DIGITAL WIRELESS COMMUNICATION III, 2001, 4395 : 224 - 232
  • [30] Applying SOA to an E-commerce System and Designing a Logical Security Framework for Small and Medium Sized E-commerce based on SOA
    Luhach, Ashish Kr.
    Dwivedi, Sanjay Kr.
    Jha, Chandra. Kr.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 341 - 346