Fleischer et al., 2007 - Google Patents
Information Assurance for Global Information Grid (GIG) Net-Centric Enterprise ServicesFleischer et al., 2007
View PDF- Document ID
- 14068667754171307781
- Author
- Fleischer R
- Goodwin B
- Lee A
- Lee L
- Sullivan R
- Tsyrklevich V
- Publication year
- Publication venue
- l/Proceedings of the 12th International Command and Control Research and Technology Symposium (ICCRTS), Rhode Island. USA
External Links
Snippet
The capabilities offered by the Internet would be of significant use on the battlefield. The envisioned Global Information Grid (GIG), effectively a military version of the Internet, will be able to provide data-on-demand to soldiers. A well-connected military force could achieve …
- 238000000034 method 0 description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Humphrey et al. | Security for grids | |
Singhal et al. | Guide to secure web services | |
Oktian et al. | BorderChain: Blockchain-based access control framework for the Internet of Things endpoint | |
Kim et al. | A security analysis of blockchain-based did services | |
Khattak et al. | A study on threat model for federated identities in federated identity management system | |
Otta et al. | Cloud identity and access management solution with blockchain | |
Phan | Service oriented architecture (soa)-security challenges and mitigation strategies | |
Karp et al. | Solving the transitive access problem for the services oriented architecture | |
Ferretti et al. | Authorization transparency for accountable access to IoT services | |
Beuchelt | Securing Web applications, services, and servers | |
Pampattiwar et al. | CBSOACH: design of an efficient consortium blockchain-based selective ownership and access control model with vulnerability resistance using hybrid decision engine | |
Chadwick | Threat modelling for active directory | |
Gajek et al. | Stronger TLS bindings for SAML assertions and SAML artifacts | |
Okafor et al. | Diverify: Diversifying identity verification in next-generation software signing | |
Sagar et al. | Information security: safeguarding resources and building trust | |
Alzomai et al. | The mobile phone as a multi OTP device using trusted computing | |
Siriwardena | Security by design | |
Fongen et al. | The integration of trusted platform modules into a tactical identity management system | |
Jesudoss et al. | Enhanced certificate-based authentication for distributed environment | |
Harisha et al. | Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures | |
Mshangi et al. | Using soft systems methodology and activity theory to exploit security of web applications against heartbleed vulnerability | |
Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
Fleischer et al. | Information Assurance for Global Information Grid (GIG) Net-Centric Enterprise Services | |
Gkotsis | Creating a windows active directory lab and performing simulated attacks | |
Maidine et al. | Key Mechanisms and Emerging Issues in Cloud Identity Systems |