[go: up one dir, main page]

Fleischer et al., 2007 - Google Patents

Information Assurance for Global Information Grid (GIG) Net-Centric Enterprise Services

Fleischer et al., 2007

View PDF
Document ID
14068667754171307781
Author
Fleischer R
Goodwin B
Lee A
Lee L
Sullivan R
Tsyrklevich V
Publication year
Publication venue
l/Proceedings of the 12th International Command and Control Research and Technology Symposium (ICCRTS), Rhode Island. USA

External Links

Snippet

The capabilities offered by the Internet would be of significant use on the battlefield. The envisioned Global Information Grid (GIG), effectively a military version of the Internet, will be able to provide data-on-demand to soldiers. A well-connected military force could achieve …
Continue reading at dodccrp.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management

Similar Documents

Publication Publication Date Title
Humphrey et al. Security for grids
Singhal et al. Guide to secure web services
Oktian et al. BorderChain: Blockchain-based access control framework for the Internet of Things endpoint
Kim et al. A security analysis of blockchain-based did services
Khattak et al. A study on threat model for federated identities in federated identity management system
Otta et al. Cloud identity and access management solution with blockchain
Phan Service oriented architecture (soa)-security challenges and mitigation strategies
Karp et al. Solving the transitive access problem for the services oriented architecture
Ferretti et al. Authorization transparency for accountable access to IoT services
Beuchelt Securing Web applications, services, and servers
Pampattiwar et al. CBSOACH: design of an efficient consortium blockchain-based selective ownership and access control model with vulnerability resistance using hybrid decision engine
Chadwick Threat modelling for active directory
Gajek et al. Stronger TLS bindings for SAML assertions and SAML artifacts
Okafor et al. Diverify: Diversifying identity verification in next-generation software signing
Sagar et al. Information security: safeguarding resources and building trust
Alzomai et al. The mobile phone as a multi OTP device using trusted computing
Siriwardena Security by design
Fongen et al. The integration of trusted platform modules into a tactical identity management system
Jesudoss et al. Enhanced certificate-based authentication for distributed environment
Harisha et al. Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures
Mshangi et al. Using soft systems methodology and activity theory to exploit security of web applications against heartbleed vulnerability
Kumar et al. Realization of threats and countermeasure in Semantic Web services
Fleischer et al. Information Assurance for Global Information Grid (GIG) Net-Centric Enterprise Services
Gkotsis Creating a windows active directory lab and performing simulated attacks
Maidine et al. Key Mechanisms and Emerging Issues in Cloud Identity Systems