SATISFYING WARFIGHTER INFORMATION IMPERATIVES ACROSS SECURITY DOMAINS

被引:0
|
作者
Whitfield, M.
Farroha, B. S.
Stewart, K.
Tague, B.
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The modern warfighters require information sharing systems that are simple, secure, agile, flexible and robust in order to achieve their mission. This often includes the requirement to share information across a variety of networks with different security domains. The technology needed to meet this requirement is known as a Cross Domain Solution (CDS). Modern warfighter requirements and legislative mandates for information sharing have increased demand for a simple, secure, agile and robust CDS to support the warfighter COCOMs, Services, and intelligence agencies and pushed them to coordinate efforts as part of a larger Cross Domain Community. This paper focuses on the goals and objectives within the Cross Domain Community to satisfy warfighter information sharing requirements, reduce duplication of effort and ensure CD capabilities are available when needed The methodology; used to address existing gaps between current solutions and desired capabilities is discussed, with specific emphasis on the warfighter's Top 5 priorities. Also discussed is the Unified Cross Domain Management Office (UCDMO) approach to improve CD technologies and identify modular components, technologies, and capabilities needed to meet unified requirements, to include those of the emerging
引用
收藏
页码:2185 / 2191
页数:7
相关论文
共 50 条
  • [41] Content Oriented Virtual Domains for Secure Information Sharing Across Organizations
    Sasaki, Takayuki
    Nakae, Masayuki
    Ogawa, Ryuichi
    [J]. PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, : 7 - 12
  • [42] PAKISTAN SECURITY IMPERATIVES AND RELATIONS WITH THE UNITED-STATES
    MALIK, IH
    [J]. BEYOND AFGHANISTAN: THE EMERGING US-PAKISTAN RELATIONS, 1989, 32 : 60 - 93
  • [43] On-device power analysis across hardware security domains stop hitting yourself
    O’flynn C.
    Dewar A.
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (04): : 126 - 153
  • [44] Global Security Governance: Conceptual Approaches And Practical Imperatives
    Kalyayev, Anatoliy
    Efimov, Gennadiy
    Motornyy, Volodymyr
    Dzianyy, Rostyslav
    Akimova, Liudmyla
    [J]. EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 4484 - 4494
  • [45] Nigeria: The Imperatives of Internal Security and Development - Problems and Prospects
    Yagboyaju, Dhikru Adewale
    [J]. CONFLICT STUDIES QUARTERLY, 2022, (40): : 43 - 58
  • [46] Policing Global Hubs: Balancing the Imperatives of Security and Trade
    Nokleberg, Martin
    [J]. BRITISH JOURNAL OF CRIMINOLOGY, 2023, 63 (03): : 709 - 726
  • [47] Institutions for Cyber Security: International Responses and Global Imperatives
    Choucri, Nazli
    Madnick, Stuart
    Ferwerda, Jeremy
    [J]. INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2014, 20 (02) : 96 - 121
  • [48] IMPERATIVES OF SOCIAL SECURITY LAWS TO SOCIAL DEVELOPMENT IN NIGERIA
    Anifalaje, Kehinde
    [J]. AFRICAN JOURNAL OF INTERNATIONAL AND COMPARATIVE LAW, 2020, 28 (02) : 244 - 266
  • [49] Social security in the 90s: The imperatives of change
    不详
    [J]. SOCIAL SECURITY BULLETIN, 1996, 59 (01) : 72 - 78