Fine-grain security for military-civilian-coalition operations though virtual private workspace technology
|Fine-grain security for military-civilian-coalition operations though virtual private workspace technology|
|Author(s)||William Maule R., Gallup S.|
|Published in||ICIW 2007: 2nd International Conference on i-Warfare and Security|
|Keyword(s)||Coi, Collaboration, Community of interest, Military, Security, Wiki, Workspace (Extra: Information services, Service oriented architecture (SOA), Telecommunication services, Web services, Coi, Collaboration, Community of interest, Military, Security, Wiki, Workspace, Military communications)|
|Article||BASE, CiteSeerX, Google Scholar|
|Web||Ask, Bing, Google (PDF), Yahoo!|
|Download and mirrors|
|Local copy||Not available|
|Remote mirror(s)||Not available|
|Export and share|
|BibTeX, CSV, RDF, JSON|
|Browse properties · List of conference papers|
Fine-grain security for military-civilian-coalition operations though virtual private workspace technology is a 2007 conference paper written in English by William Maule R., Gallup S. and published in ICIW 2007: 2nd International Conference on i-Warfare and Security.
Next-generation service-oriented architectures provide a means for unprecedented levels of collaboration. Security built upon LDAPv3 when coupled with virtual private database technology can enable secure operations within a domain while retaining need-to-know thresholds with fine-grain security. This paper discusses such a technology in use for navnetwarcom trident warrior experimentation. A simulated scenario is discussed in which 12 officers involved in a mhq with moc in mda scenario prototyped an operational application of a comprehensive suite of xml web services that provided a personalised portal for each user, email, chat, presence, instant messenger, web conference, threaded discussions, and secured virtual workspaces with libraries, discussion area, and task management. The focus was on methods to secure communications across military, civilian and coalition operations preliminary to more extensive testing to occur in Trident Warrior 07. Along with an introduction to the technology the study results are presented, addressing methodology and protocols for highly collaborative sessions with varying levels of security in highly dynamic scenarios.
- This section requires expansion. Please, help!
Probably, this publication is cited by others, but there are no articles available for them in WikiPapers.