Coalition Networks for Secure Information Sharing (CoNSIS) Invited Paper

被引:0
|
作者
Eggen, Anders [1 ]
Hauge, Mariann [1 ]
Hedenstad, Ole Erik [1 ]
Lund, Ketil [1 ]
Legaspi, Albert [2 ]
Seifert, Hartmut [3 ]
Sevenich, Peter [4 ]
Simon, Pierre [5 ]
机构
[1] Norwegian Def Res Estab FFI, Kjeller, Norway
[2] SPAWAR Syst Ctr Pacif, San Diego, CA USA
[3] IABG, Ottobrunn, Germany
[4] Fraunhofer, Wachtberg, Germany
[5] COGISYS, Pertuis, France
关键词
Communications; Tactical SOA; Security; Management; NNEC; Disadvantaged Grids;
D O I
10.1109/MILCOM.2013.68
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The multilateral CONSIS project is related to the migration towards Network Enabled Capabilities (NEC) in the participating countries. As such, CoNSIS aligns with the overarching objective of the NATO NEC (NNEC) to enhance the Alliance's ability to federate various capabilities at all levels, military (strategic to tactical) and civilian through networking and information infrastructure. Providing security and efficient network management have been important aspects of this work. The work has been a combination of theoretical studies and field experiments in order to get hands-on experience with the involved technologies. This possibility of addressing radios, networks, SOA, security and management together, has given us knowledge on how the different technologies affect each other and how they may be combined. A follow up project (CoNSIS phase II) is being planned with startup in 2014.
引用
收藏
页码:354 / 359
页数:6
相关论文
共 50 条
  • [31] The Complexity of Information Theoretic Secure Computation (INVITED TALK)
    Ishai, Yuval
    2012 IEEE INFORMATION THEORY WORKSHOP (ITW), 2012, : 80 - 80
  • [32] Secure health information sharing system: SHARE
    Wu, M
    Mui, L
    Mohtashemi, M
    Szolovits, P
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2001, : 1060 - 1060
  • [33] A Decision Support System for Secure Information Sharing
    Fokoue, Achille
    Srivatsa, Mudhakar
    Rohatgi, Pankaj
    Wrobel, Peter
    Yesberg, John
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 105 - 114
  • [34] Secure Information Sharing in Digital Supply Chains
    Bhargava, Bharat
    Ranchal, Rohit
    Ben Othmane, Lotfi
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1636 - 1640
  • [35] Linguistic protocols for secure information management and sharing
    Ogiela, Marek R.
    Ogiela, Urszula
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 564 - 572
  • [36] Secure medical information sharing in cloud computing
    Shao, Zhiyi
    Yang, Bo
    Zhang, Wenzheng
    Zhao, Yi
    Wu, Zhenqiang
    Miao, Meixia
    TECHNOLOGY AND HEALTH CARE, 2015, 23 : S133 - S137
  • [37] Secure Information Brokering and Sharing in Distributed Systems
    Kumar, G. Siva
    Babu, K. Mahesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 107 - 111
  • [38] Communication modes for information content analysis - Invited paper
    Burvall, A
    Martinsson, P
    Friberg, AT
    LFNM 2004: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON LASER AND FIBER-OPTICAL NETWORKS MODELING, 2004, : 112 - 114
  • [39] Invited paper: Electrowetting-based information displays
    Hayes, Robert A.
    2008 SID INTERNATIONAL SYMPOSIUM, DIGEST OF TECHNICAL PAPERS, VOL XXXIX, BOOKS I-III, 2008, 39 : 651 - 654
  • [40] Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments
    Hsu, Chingfang
    Harn, Lein
    Xia, Zhe
    Bai, Linyan
    Zhang, Ze
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):