94 results on '"Net-centric"'
Search Results
2. Design Of An Automatic Bell Warning System For Prayer Times In A Net Centric Computing Lab
- Author
-
Ritzkal Ritzkal, Juhariansyah Juhariansyah, and Ade Hendri Hendrawan
- Subjects
Warning system ,Net-centric ,Computer science ,media_common.quotation_subject ,Control (management) ,System testing ,computer.software_genre ,Real-time clock ,Prayer ,Test (assessment) ,Network planning and design ,Artificial Intelligence ,Control and Systems Engineering ,Operating system ,computer ,media_common - Abstract
The development of science and technology is now increasingly providing convenience in everyday life. Various household appliances to office work tools use electronic devices so that human work is much lighter and easier. As an example of the use of an Arduino microcontroller which is used as an automatic bell time warning bell control. This research wants to provide a solution to these problems by giving automatic prayer times. The formulation of the problem in research is. (i) How do you design and implement a set of prayer time warning bell system tools? (ii) How do you test the series of prayer bell alert system tools? There are several research objectives including the following. (i) Can design and implement a series of prayer time warning bell system tools. (ii) Can produce a test time series of prayer time bell alarm system tools. The method in this study includes (i) analysis consisting of needs analysis, and analysis of work methods, (ii) Design consisting of Hardware Design, and Network Design (iii) Implementation consists of Hardware Implementation, Software Implementation , (iv) Testing Consists of Real Time Clock (RTC) Testing, Dfplayer Testing, i2c LCD Testing, System Testing Results, Telegram Testing. This prayer time automatic alarm bell is equipped with a dfplayer module that can play mp3, or wav, sound file formats. So the call to prayer information can play well. And this warning bell system will provide a notification to the telegram when the call to prayer time has arrived.
- Published
- 2020
3. Cyber Security and Information Exchange Analysis of Automatic Dependent Surveillance Broadcast
- Author
-
Erich Leitgeb, Philipp Ortner, and Holger Flühr
- Subjects
Structure (mathematical logic) ,Automatic dependent surveillance-broadcast ,Computer science ,Net-centric ,Air traffic management ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Communications system ,Data link ,0203 mechanical engineering ,SAFER ,0202 electrical engineering, electronic engineering, information engineering ,computer ,Information exchange - Abstract
The European Air Traffic Management (ATM) system is moving to a net centric operational environment. This transformation increasingly depends on appropriate communication, navigation and surveillance technologies (CNS) to enhance safety, efficiency, and capacity. New aeronautical data link communications systems such as Automatic Dependent Surveillance Broadcast (ADS-B) allows safer operations, denser airspace and cost savings for operators. However, it is a fact that ADS-B provides unauthenticated information over an unencrypted data link. In this paper, the Mode S data link structure and broadcasts are elaborated as basis to provide a comprehensive understanding for the information exchange and cyber security analysis of ADS-B. The information exchange is demonstrated by analyzing interrogated Mode S broadcasts, followed by a cyber security analysis in terms of a threat picture and taxonomy for various possible attacks. Finally, a scenario-based dynamic threat analysis is illustrated to clarify the consequences of ADS-B vulnerabilities.
- Published
- 2019
4. The Case for Active Fratricide Avoidance in Net-Centric C2 Systems
- Author
-
John Barnett
- Subjects
Fratricide ,Net-centric ,Computer science ,people ,Computer security ,computer.software_genre ,people.cause_of_death ,computer - Published
- 2017
5. Towards semantic fusion using information quality and the assessment of objects and situations to improve emergency situation awareness
- Author
-
Leonardo Castro Botega, Valdir Amancio Pereira, Jordan Ferreira Saran, Caio Saraiva Coneglian, Matheus Ferraroni Sanches, and Regina B. Araujo
- Subjects
Knowledge management ,Situation awareness ,Net-centric ,Computer science ,business.industry ,Information quality ,02 engineering and technology ,computer.software_genre ,Semantics ,Data science ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Semantic integration ,business ,computer ,Semantic Web ,Data integration ,Situation analysis - Abstract
Information Fusion is the integration of synergic information to support cognition and high-level processing. Emergency management systems may take advantage of such integration and better support human operators in the development of Situational Awareness (SAW) for decision-making. The critical and dynamic nature of real emergency scenarios impose challenges to reveal, integrate and derive useful information for decision processes. The problem increases when humans are the main source of data, leading to information quality issues, such as imprecision, inconsistency and uncertainty. Current syntactical-only fusion approaches are limited regarding the assessment of situational meaning and human language nuances. Semantic models help to describe and to apply relationships among entities that may be useful for a net centric fusion and Situation Assessment (SA) routines. The objective of this paper is to present advances towards a new semantic fusion approach supported by information quality inferences and semantic web concepts to improve the SA about emergency situations and hence supporting SAW. For such, a new architecture is presented to integrate objects and situation assessment approaches by syntactical and semantic means. A previous fusion approach based on a syntactic integration with quality indexes is used to illustrate the improvements on information fusion results with the semantic models.
- Published
- 2016
6. Design Principles of a Federated Service-oriented Architecture Model for Net-centric Data Sharing
- Author
-
Nick Duan
- Subjects
Data sharing ,OASIS SOA Reference Model ,Computer science ,computer.internet_protocol ,Net-centric ,Modeling and Simulation ,Distributed computing ,Scalability ,Design elements and principles ,Service-oriented architecture ,Architecture ,Engineering (miscellaneous) ,computer - Abstract
One of the major challenges facing many Service-oriented Architecture (SOA)-based programs used in the Department of Defense (DoD) is how to define a SOA model that is robust and scalable enough to meet mission-specific needs, while satisfying the Net-centric requirements for data sharing across the multiple services and agencies. While there have been many SOA initiatives in the DoD with various successes, data and service interoperability across multiple organizations are still limited due to the lack of a coherent and overarching SOA model. Most SOA implementations in the DoD today still follow a complex centralized model that lacks the necessary flexibility, extensibility, and scalability for large enterprises. We believe that a federated SOA model, as proposed by the present author in a previous work, has the benefits and potential to solve both the scalability and complexity problems that have become prevalent in centralized SOAs. In this paper, several design principles are introduced for implementing such a federated SOA model in a Net-centric Environment. First, we provide a formal definition of interoperability and establish an enterprise model with the necessary model components and behaviors for achieving the desired federation. Secondly, the design principles are described in detail revolving around the use of core enterprise services (i.e., a registry service and a security policy service) and focused on the capability to support disconnected operations. The benefits of the model in representing a federated enterprise are demonstrated via a concrete study on an existing SOA implementation in the DoD. Finally, future research directions, including the establishment of a quantitative federation model and analyzing its behaviors via modeling and simulation techniques, are highlighted.
- Published
- 2009
7. Net-Centric Adapter for Legacy Systems
- Author
-
T. Turner, S. Soderlund, and A. Thomas
- Subjects
Engineering ,Software modernization ,Computer Networks and Communications ,business.industry ,Net-centric ,Legacy system ,Mission critical ,Global Information Grid ,Interoperability ,Computer security ,computer.software_genre ,Computer Science Applications ,Control and Systems Engineering ,Component-based software engineering ,Systems engineering ,Electrical and Electronic Engineering ,Software architecture ,Software engineering ,business ,computer ,Information Systems - Abstract
The Net-Centric Adapter for Legacy Systems (NCALS) is a software technology that makes legacy system data and services available in near real-time to the military Global Information Grid (GIG). The intent of NCALS is to lower the cost and risk, and to decrease the time required for legacy systems to comply with U.S. Department of Defense (DoD) net-centric technical standards. Many different systems could use a common, configurable NCALS software component to comply with these standards. The benefit to the warfighter is improved interoperability with joint and coalition forces. NCALS enables legacy systems to move to a Service-Oriented Architecture (SOA) compatible with the GIG without requiring a costly and risky re-architecture of their legacy software. In addition, NCALS enables mission critical systems such as weapon systems to segregate their real-time, mission critical software from enterprise integration software. This maintains the safety and security required by such systems, while accommodating rapid changes in Internet-based, enterprise technologies. This paper will discuss the legacy system challenge and describe a technology prototype developed by the Naval Surface Warfare Center (NSWC) Dahlgren to realize the NCALS concept. The prototype works automatically, behind the scenes, to expose legacy data to the GIG and to make GIG data available to legacy systems.
- Published
- 2009
8. Effect of Audio-Visual Alerts on Situation Awareness and Workload in a Net-Centric Warfare Scenario
- Author
-
Larry L. Meliza, Jennifer M. Ross, and John S. Barnett
- Subjects
Engineering ,Battle ,Situation awareness ,Net-centric ,business.industry ,media_common.quotation_subject ,Workload ,Adversary ,Computer security ,computer.software_genre ,Medical Terminology ,Battlefield ,Audio visual ,Human operator ,business ,computer ,Medical Assisting and Transcription ,media_common - Abstract
The goal of net-centric warfare (NCW) is to give soldiers an information advantage that leads to a war-fighting advantage. However, the inherent nature of NCW systems is often quite complex and dynamic, which leads to impaired situation awareness (SA) and heightened levels of mental workload for the human operator. The following study investigated the moderating effects of automated audio-visual alerts on user SA and perceived workload while using a net-centric warfare system. Twenty-six participants observed battlefield scenarios on a simulation of the common NCW system, Force XXI Battle Command Brigade and Below (FBCB2), and were required to pay attention and remember critical events (e.g., the appearance of an enemy unit). The system was presented with or without an automated alerting aid that provided combined auditory and visual alerts when certain critical events occurred (i.e., System to Help Implement and Empower Leader Decisions; SHIELD). Results revealed that contrary to current assumptions the use of an automated alerting aid did not impact user SA; however, perceived workload was significantly lower with the addition of the alerting aid. This work demonstrates that the automated alerts used in this NCW experiment do not affect SA (either positively or negatively) and decreased perceived workload.
- Published
- 2007
9. Net-centric or Networked Military Operations?
- Author
-
Terry Moon
- Subjects
Computer science ,Net-centric ,Political Science and International Relations ,Geography, Planning and Development ,Computer security ,computer.software_genre ,computer - Published
- 2007
10. 4.4.2 Net-Centric Dynamic System Model Architecture
- Author
-
Yves LaCerte
- Subjects
Engineering ,business.industry ,Event (computing) ,Net-centric ,Distributed computing ,Global Information Grid ,Interoperability ,Context (language use) ,Computer security ,computer.software_genre ,Determinism ,Chain of events ,Architecture ,business ,computer - Abstract
Net-Centric weapon systems interoperate on the Global Information Grid to achieve information superiority. In a sensor-to-shooter scenario, the chain of events that connect the initiation of a control event to its result is not within a closed space. The chain may incorporate information gathering devices and weapons a thousand miles apart, or any of a myriad of devices in a more local confederated environment. Net-Centric systems need to consider determinism not only on the control side, but the communications side as well. This paper investigates a Net-Centric Dynamic System Model architecture in the context of interoperability.
- Published
- 2004
11. An AI-ESTATE conformant interface for net-centric diagnostic and prognostic reasoning
- Author
-
Nathan Fortier, John W. Sheppard, and Houston King
- Subjects
Service (systems architecture) ,Computer science ,business.industry ,Net-centric ,Interface (Java) ,computer.internet_protocol ,Standardized approach ,Probabilistic logic ,Intelligent decision support system ,Semantic reasoner ,Model-based reasoning ,XML Protocol ,Server ,Prognostics ,Artificial intelligence ,Electrical and Electronic Engineering ,Software engineering ,business ,Instrumentation ,computer ,XML - Abstract
There exists a wide field of strong theoretical models, which provide a basis for diagnostic and probabilistic reasoning. Among these are Bayesian methods, decision trees, D-matrices, logic based frameworks, and more. The IEEE 1232–2010 Standard for Artificial Intelligence Exchange and Service Tie to All Test Environments (AI-ESTATE) [1] strives to provide a common interface for interacting with these reasoning models to establish a common platform for prognosis and diagnosis. In this work, we propose a platformagnostic net-centric framework and interface, conformant to the AI-ESTATE standard. The IEEE AI-ESTATE provides platform-agnostic models and a service interface facilitating the exchange of diagnostic knowledge and reasoning capabilities. The Numerical Intelligent Systems Laboratory at Montana State University has been working continuously on promoting and enhancing this standard. Within AI-ESTATE is defined a set of Reasoner Manipulation Services (i.e., a service API). These services provide a standardized way to interact with a reasoning server for the purposes of diagnostic and prognostics. Previously, the AIESTATE service API had been implemented locally within our tool, called the Standards-based Analysis Platform for Predictive Health and Intelligent Reasoning Environment (SAPPHIRE).
- Published
- 2014
12. Engineering component-based net-centric systems for embedded applications
- Author
-
Jens H. Jahnke
- Subjects
Engineering ,business.industry ,Net-centric ,Maintainability ,Software development ,General Medicine ,computer.software_genre ,Embedded controller ,Embedded software ,Avionics software ,Collaboration ,The Internet ,Software engineering ,business ,computer - Abstract
The omnipresence of the Internet and the World Wide Web (Web) via phone lines, cable-TV, power lines, and wireless RF devices has created an inexpensive media for telemonitoring and remotely controlling distributed electronic appliances. The great variety of potential benefits of aggregating and connecting embedded systems over the Internet is matched by the currently unsolved problem of how to design, test, maintain, and evolve such heterogeneous, collaborative systems. Recently, component-oriented software development has shown great potential for cutting production costs and improving the maintainability of systems. We discuss component-oriented engineering of embedded control software in the light of emerging requirements of distributed, net-centric systems. Our approach is baed on applying the graphical specification language SDL for composing complex networks of embedded software components. From the SDL specification, we generate internet-aware connector components to local embedded controller networks. The described research is carried out in a collaborative effort between industry and academia.
- Published
- 2001
13. [Untitled]
- Author
-
P.W. Grant, Min Chen, Abdul S. Haji-Ismail, and Mark Kiddell
- Subjects
Rapid prototyping ,Java ,Multimedia ,Computer science ,Net-centric ,media_common.quotation_subject ,computer.software_genre ,Computer Graphics and Computer-Aided Design ,Programming style ,Scripting language ,Engineering tool ,Multimedia software ,computer ,Software ,computer.programming_language ,De facto standard ,media_common - Abstract
The World Wide Web (WWW) is now accepted as a i>de facto standard for human–computer interaction and human–human communication, so it is desirable to develop net-centric, multimedia and collaborative applications. In this paper, we present a new scripting language, JACIE, designed to support rapid prototyping and implementation of such applications. The support for the management of multimedia interaction and communication in collaborative applications is highlighted. JACIE facilitates such support through the concepts of channels and a collection of interaction protocols. A template-based programming style is adopted by JACIE, using a single program for both client and server, and platform-independence achieved by employing Java as the target language. All these features characterise a desirable multimedia software engineering tool.
- Published
- 2001
14. Net-centric System of Systems framework for human detection
- Author
-
Ferat Sahin and Ryan M. Bowen
- Subjects
System of systems ,Standardization ,Net-centric ,Computer science ,computer.internet_protocol ,Distributed computing ,Interoperability ,XML framework ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Directory service ,Software architecture ,computer ,XML - Abstract
System of Systems (SoS) architectures have been used to conceptually define complex systems. However, very few SoS architectures have been physically realized to solve real-world problems. Proposed in this work is the full realization of a net-centric SoS architecture used to implement and integrate a complex system used to automate human detection from an image source. A SoS architecture was selected to implement the human detection system due to a SoS's ability to achieve high levels of interoperability. This high level of interoperability is feasible via standardization of communication and by structuring information to conform to a proposed XML framework. Additionally, each individual system within the SoS hierarchy is functionally decomposed based on sets defined services that each system requires and provides. Moreover, a new concept of a commonly implemented directory service is used to initialize system communication and automate SoS architecture discovery.
- Published
- 2013
15. Flight information exchange via net-centric services
- Author
-
M. Tanino, B. Taylor, and Charles Chen
- Subjects
Net-centric ,business.industry ,Aviation ,Computer science ,Proprietary format ,System Wide Information Management ,Air traffic management ,Air traffic control ,Computer security ,computer.software_genre ,Data sharing ,Telecommunications ,business ,computer ,Information exchange - Abstract
Flight information in Air Traffic Management (ATM) systems today is scattered across multiple systems in proprietary formats. Systems must maintain multiple point-to-point connections to access data necessary to fulfill operational objectives leading to high overhead costs. For example, flight messages from the en-route system are accessed through the legacy interfaces in a proprietary format, which requires domain knowledge of the data definition and format in order to parse the content. Developing and maintaining such connections and formats increases costs to both the consumer and the provider. The FAA's Next Generation (NextGen) solution is to abstract the data content and information to standard formats and publish the data to net-centric services in order to provide common services and governance for net-centric data sharing. Through a set of demonstrations, the Federal Aviation Administration (FAA) has shown improved logical and physical simplicity and harmonization of flight information exchange through standardized data and net-centric services. During these demonstrations, it was determined that flight information common support services must be hosted at the enterprise level and made accessible through System Wide Information Management (SWIM) as net-centric services in order for governance rules to be enforced and information be shared authoritatively to the global flight community.
- Published
- 2013
16. Data Diodes in Support of Trustworthy Cyber Infrastructure and Net-Centric Cyber Decision Support
- Author
-
Frederick T. Sheldon, Hamed Okhravi, and J. Haines
- Subjects
Decision support system ,Work (electrical) ,Database ,Computer science ,Net-centric ,Order (exchange) ,Attack patterns ,Process control ,Industrial control system ,Computer security ,computer.software_genre ,computer ,Critical infrastructure - Abstract
Data diodes provide protection of critical cyber assets by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to understand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we study data diodes, their functionalities and limitations. We then propose two critical infrastructure systems that can benefit from the additional protection offered by data diodes: process control networks and net-centric cyber decision support systems. We review the security requirements of these systems, describe the architectures, and study the trade-offs. Finally, the architectures are evaluated against different attack patterns.
- Published
- 2013
17. Net-Centric Network and Operational Management
- Author
-
Elham Ghashghai and Jim Hamilton
- Subjects
Process management ,Computer science ,Net-centric ,Systems management ,FCAPS ,Element management system ,computer.software_genre ,computer ,Network management station ,Network management application - Published
- 2012
18. Leveraging the cloud to create a network centric support environment for support equipment
- Author
-
Anthony L. Alwardt
- Subjects
Engineering ,ComputingMethodologies_SIMULATIONANDMODELING ,business.industry ,Net-centric ,computer.internet_protocol ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Cloud computing ,Certification ,Computer security ,computer.software_genre ,Maintenance engineering ,Engineering management ,Navy ,Software ,General partnership ,business ,computer ,XML - Abstract
The Boeing Company Support Equipment & Services (SES) organization, in partnership with the Army, Ground Marine Corps and Navy, is leveraging the Cloud to create a Network Centric Support Environment for Support Equipment (SE) by developing and deploying the Next Generation Operations Management Software (NxOMS) within the Department of Defense (DoD).
- Published
- 2012
19. Role-based integrated access control and data provenance for SOA based net-centric systems
- Author
-
Bhavani Thuraisingham, I-Ling Yen, Wei Zhu, Wei She, and Farokh B. Bastani
- Subjects
Service (systems architecture) ,Information Systems and Management ,Computer Networks and Communications ,Computer science ,computer.internet_protocol ,media_common.quotation_subject ,0211 other engineering and technologies ,Access control ,02 engineering and technology ,computer.software_genre ,Data modeling ,Resource (project management) ,020204 information systems ,Extended Access Control ,0202 electrical engineering, electronic engineering, information engineering ,Role-based access control ,Quality (business) ,Information flow (information theory) ,media_common ,021110 strategic, defence & security studies ,Database ,Net-centric ,business.industry ,Service-oriented architecture ,Computer Science Applications ,Data flow diagram ,Hardware and Architecture ,Data quality ,business ,computer - Abstract
Service-oriented architecture (SOA) has been widely adopted in the development of many net-centric application systems. In SOA, services potentially from different domains are composed together to accomplish critical tasks. In these systems, security and trustworthiness are the major concerns that have not been well addressed. Many access control models have been developed to ensure proper accesses to critical resources from local as well as external domains. Also, many data provenance schemes have been proposed in recent years to support data quality assessment and enhancement, data reproduction, etc. However, none of the existing mechanisms consider both access control and data provenance in a unified model. In this paper, we propose an integrated role-based access control and data provenance model to secure the cross-domain interactions. We develop a role-based data provenance scheme which tracks the roles of the data originators and contributors and uses this information to help evaluate data trustworthiness. We also make use of the data provenance information and the derived data quality attributes to assist with role-based access control. In this integrated model, the secure usage of a data resource must also consider the quality and trustworthiness of the data. To realize this concept, we develop an extended access control model in which access permissions are specified with constraints over the provenance attributes. Also, to assure confidentiality, we record the access constraints from the data originators and contributors to help decide how the data should be further disseminated.
- Published
- 2011
20. Tracking commander's intent in dynamic networks
- Author
-
Daniel O'Neill, Michael K. Martin, Patrick Perrin, Anni Woolley, Kathleen M. Carley, and Paul Sauk
- Subjects
Battle management language ,Dynamic network analysis ,Net-centric ,Computer science ,Order (business) ,Human–computer interaction ,Instrumentation (computer programming) ,Computer security ,computer.software_genre ,computer ,Electronic mail ,Test (assessment) - Abstract
A goal of the Tactical Human Integration of Networked Knowledge (THINK) Army Technology Objective (ATO) is to develop and test a proposed socio-cognitive network analytic method that aims to improve the effective understanding and execution of commander's intent (CI), for a given echelon, based on the interpretation of the operational order (OPORD) and the monitoring of the warfighters' activities, via their communications. Network Text Analysis is used to extract a meta-network model from OPORDs and operational discourse, such as email and chat logs. The contents of this meta-network model are coded using the Battle Management Language (BML), and Dynamic Network Analysis (DNA) techniques are then applied to the extracted data in order to determine the extent to which a Commander's Intent is being accurately followed and to identify points and bases for departure. This will lead to the establishment of new requirements for instrumentation of the net-centric environment for detection of human behavior.
- Published
- 2011
21. Net-centric information and knowledge management and dissemination for data-to-decision C2 applications using intelligent agents and service-oriented architectures
- Author
-
G. Jewell, Joseph B. Kopena, S. Randles, F. Koss, Christopher T. Cannon, A. Chan, J. Lott, I. Simmons, Duc Ngoc Nguyen, A. Patwardhan, David Millar, M. McCurdy, Lex Lehman, J. Ruschmeyer, Todd Urness, M. Mai, G. Tassone, S. Kizenko, R. Wray, J. Bradshaw, M. Nicholson, Bernard Goren, William C. Regli, R. Forkenbrock, Israel Mayk, J. Lindquist, and Z. Jastrebski
- Subjects
Engineering ,Knowledge management ,Net-centric ,business.industry ,computer.internet_protocol ,Interoperability ,Information technology ,Service-oriented architecture ,computer.software_genre ,Network operations center ,Intelligent agent ,Software agent ,Network-centric warfare ,business ,computer - Abstract
The Tactical Information Technologies for Assured Network Operations (TITAN) Program aims to achieve net-centric information and knowledge management and dissemination integrated with data-to-decision C2 Applications. TITAN is a multi-year effort to develop, demonstrate and mature information and knowledge (I&K) management and dissemination (M&D) services spanning multiple echelons and provide support to the network-centric operations process with collaborative military planning and execution monitoring. TITAN integrates heterogeneous, open-source intelligent agents and web services with network-centric communications infrastructures. These agents and services are designed to support users executing the Operations Process for command and control across command echelons from units on the upper tactical internet at brigade and above to units on the lower tactical internet at battalion and below. The result is an adaptive system for collaborative battle command planning, execution and monitoring. In delivering TITAN, the team had to engineer novel solutions to several current research problems. These technical contributions include the development of a Battle Command-Warfighter (BCW) interface that integrates planning with situation awareness; definition of interoperability schemas for C2 information sources and services; management of distributed provenance; implementation of a network-centric message bus for communications across different network echelons and radios; and the development of agents and services to support Mission Command planning processes and numerous Data-to-Decision (D2D) threads in a comprehensive manner to execute TRADOC's Multi-Level Scenario. The integrated TITAN system has been demonstrated in numerous settings and was featured at the Ft. Dix C4ISR "On the Move" experiment in summer 2011.
- Published
- 2011
22. SoSE architecture principles for Net-Centric Multi-Int Fusion Systems
- Author
-
Marco A. Solano
- Subjects
business.industry ,Net-centric ,Computer science ,computer.internet_protocol ,Functional requirement ,Service-oriented architecture ,Information assurance ,Systems analysis ,Enterprise system ,Systems engineering ,Information system ,Systems design ,Software engineering ,business ,computer - Abstract
Multi-Int Fusion Systems are complex due to the need to architect a solution that covers a broad domain space with diverse functional requirements. Consequently, some of these requirements can seem orthogonal, such as the need for real-time embedded processing for on-board platforms juxtaposed with large-scale enterprise systems comprising application servers, database farms, and service-oriented architectures. Add to these considerations, the need to address Information Assurance, which includes functionality for confidentiality, integrity, availability, authentication, and non-repudiation - all applied to a broad set of heterogeneous data and implemented across multiple organizations spanning transnational jurisdictions. These challenges render the traditional systems engineering approach ineffective. This paper explores key issues innate to Net-Centric Multi-Int Fusion Systems, and offers SoSE principles for a top-down analysis of functional requirements and guidelines for reconciling design trade-offs - essential steps to ensure the synthesis of a holistic and robust SoS architecture.
- Published
- 2011
23. Discovery and Mediation Approaches for Management of Net-Centric Web Services
- Author
-
David W. Aha, Philip Moore, Richard Sween, Roy Ladner, Kalyan Moy Gupta, Bruce Lin, and Frederick E. Petry
- Subjects
World Wide Web ,Net-centric ,Computer science ,Mediation ,Services computing ,Web service ,computer.software_genre ,computer - Abstract
This paper describes an Integrated Web Services Brokering System (IWB) to support the automated discovery and application integration of Web Services. In contrast to more static broker approaches that deal with specific data servers, our approach creates a dynamic knowledge base from Web Service interface specifications. This assists with brokering of requests to multiple data providers even when those providers have not implemented a community standard interface or have implemented different versions of a community standard interface. A specific context we illustrate here is the domain of meteorological and oceanographic (MetOc) Web Services. Our approach includes the use of specific domain ontologies and has evaluated the use of case-based classification in the IWB to support automated Web Services discovery. It was also demonstrated that the mediation approach could be extended to OGC Web Coverage Services.
- Published
- 2011
24. SMASHUP: secure mashup for defense transformation and net-centric systems
- Author
-
Mike Gilger, Matthew P. Shaver, Pramod A. Jamkhedkar, Gregory L. Heileman, and Mark D. Heileman
- Subjects
Web 2.0 ,Net-centric ,business.industry ,Computer science ,Insider threat ,Mashup ,Access control ,The Internet ,Multilevel security ,computer.software_genre ,business ,Computer security ,computer - Abstract
The recent development of mashup technologies now enables users to easily collect, integrate, and display data from a vast array of different information sources available on the Internet. The ability to harness and leverage information in this manner provides a powerful means for discovering links between information, and greatly enhances decisionmaking capabilities. The availability of such services in DoD environments will provide tremendous advantages to the decision-makers engaged in analysis of critical situations, rapid-response, and long-term planning scenarios. However in the absence of mechanisms for managing the usage of resources, any mashup service in a DoD environment also opens up significant security vulnerabilities to insider threat and accidental leakage of confidential information, not to mention other security threats. In this paper we describe the development of a framework that will allow integration via mashups of content from various data sources in a secure manner. The framework is based on mathematical logic where addressable resources have formal usage terms applied to them, and these terms are used to specify and enforce usage policies over the resources. An advantage of this approach is it provides a formal means for securely managing the usage of resources that might exist within multilevel security environments.
- Published
- 2011
25. Agile development for system of systems: Cyber security integration into information repositories architecture
- Author
-
Deborah L. Farroha and Bassam S. Farroha
- Subjects
Enterprise systems engineering ,System of systems ,Flexibility (engineering) ,Engineering ,business.industry ,Net-centric ,computer.internet_protocol ,Process (engineering) ,Information sharing ,Service-oriented architecture ,Computer security ,computer.software_genre ,business ,computer ,Agile software development - Abstract
In order to meet the mission needs of today and keep up with the pace of technological advances, adapting the Enterprise Systems Engineering (ESE) process in a time constrained mission-centric environment is critical to leverage the efficient delivery of new capabilities in a Net Centric environment. Agility (contemporary) versus rigidity (traditional) are approaches that have their trade-offs but to meet the demands and needs of our war-fighters, we must have an ESE process that allows us to deliver quality capabilities to the tactical edge. Governance plays a significant role and testing services needs to be addressed different from the traditional TE which starts with data discovery and access, we analyzed several concepts to achieve agility and higher level of security in Information Sharing Systems. The concept of the GIG also ensures that systems are not only robust but also incorporate the flexibility needed to satisfy needs that evolve during the system's life.
- Published
- 2011
26. Network Centric Warfare in the Age of Cyberspace Operations
- Author
-
II Folks and L Richard
- Subjects
Engineering ,ComputingMilieux_THECOMPUTINGPROFESSION ,Net-centric ,business.industry ,media_common.quotation_subject ,Military strategy ,Doctrine ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Revolution in Military Affairs ,Computer security ,computer.software_genre ,Cyberwarfare ,National Strategy to Secure Cyberspace ,Network-centric warfare ,business ,Cyberspace ,computer ,media_common - Abstract
The emergence of cyberspace as a new warfighting domain and the DOD's establishment of Cyberspace Command make clear the United States' intent to gain superiority in this emerging area vital to overarching national interests. In the early 1990s a "theory of war" focused on information technology and networking rose to the forefront of military thinking with the emergence of Vice Admiral Arthur Cebrowski's Net-Centric Warfare. At the time it was hailed as a potential game changing revolution in military affairs. Specifically Net-Centric Warfare promised to deliver seamless networking of friendly force elements in order to increase combat power. Fast forward to December 2006, with the publication of the National Military Strategy for Cyberspace Operations, foundational DOD doctrine establishing cyberspace as a warfighting domain. With so much effort and national treasure being applied to cyberspace issues, it is crucial that past network centric warfare concept be applied in today's cyberspace environment. This paper examines the relevance of net centric warfare in the age of cyberspace operations and seeks to determine if combining the tenets of net centric warfare with emerging cyberspace operations doctrine could deliver improved operational capabilities.
- Published
- 2011
27. Science and Technology Issues Relating to Data Quality in C2 Systems
- Author
-
Jonathan Agre, Corinne Kramer, and Marius S. Vassiliou
- Subjects
Engineering ,Total quality management ,business.industry ,Net-centric ,media_common.quotation_subject ,Data management ,Usability ,Computer security ,computer.software_genre ,Data science ,Variety (cybernetics) ,Data quality ,Quality (business) ,business ,computer ,Reliability (statistics) ,media_common - Abstract
A C2 system depends crucially on having high-quality underlying data. There is still no "best" set of data quality dimensions and metrics for C2. We consider the sixteen data quality criteria identified by the Total Data Quality Management (TDQM) research community, as well as the dimensions identified by the ISO 8000 standard. We map these into the criteria commonly applied by the intelligence community (IC), and those identified by various parts of the US DoD. The IC's "usability" criterion covers several different concepts that are difficult to measure. Meanwhile, the DoD's Net Centric Data Strategy (NCDS) arguably does not adequately address the notion of data timeliness. The NCDS covers some important factors such as believability and reputation, but the coverage is primarily limited to using authoritative, vetted data sources. This does not address important situations where data come from a variety of sources with varying degrees of reliability. On the other hand, the TDQM criteria do not adequately capture the notions of readiness and adaptability. Once an accepted set of data quality characteristics and associated metrics for C2 is available, there is a good case for explicitly incorporating it into C2 system operations.
- Published
- 2011
28. Agile Net-Centric Systems Using DEVS Unified Process
- Author
-
Saurabh Mittal
- Subjects
Business Process Execution Language ,Business Process Model and Notation ,DEVS ,computer.internet_protocol ,Net-centric ,Computer science ,Business process ,Systems engineering ,Department of Defense Architecture Framework ,Service-oriented architecture ,computer ,Unified Process - Abstract
Industry and government are spending extensively to transition their business processes and governance to Service Oriented Architecture (SOA) implementations for efficient information reuse, integration, collaboration and cost-sharing. SOA enables orchestrating web services to execute such processes using Business Process Execution Language (BPEL). Business Process Modeling Notation (BPMN) is another method that outputs BPEL for deployment. As an example, the Department of Defenses (DoD) grand vision is the Global Information Grid that is founded on SOA infrastructure. The SOA infrastructure is to be based on a small set of capabilities known as Core Enterprise Services (CES) whose use is mandated to enable interoperability and increased information sharing within and across Mission Areas, such as the Warfighter domain, Business processes, Defense Intelligence, and so on. Net-Centric Enterprise Services (NCES) is DoDs implementation of its Data Strategy over the GIG. However, composing/orchestrating web services in a process workflow (a.k.a Mission thread in the DoD domain) is currently bounded by the BPMN/BPEL technologies. With so much resting on SOA, their reliability and analysis must be rigorously considered. The BPMN/BPEL combination neither has any grounding in system theoretical principles nor can it be used in designing net-centric systems based on SOA in its current state. In this work we present a system theoretical framework using the DEVS Unified Process (DUNIP) that allows bifurcated model-continuity based life cycle process for simultaneous development of the executable system using web-services (including the model) and the automated generation of Test-suite for Verification and Validation. The entire net-centric system, which includes artifacts like the model, the simulation and the real system, is deployed on SOA. The simulation system is made possible on a recently developed DEVS-based service framework called DEVS/SOA. We will show the design of DEVS-agents based on WSDLs and how they are composed towards the systems specification. We will demonstrate how agility is an inherent characteristic of such a system founded on DUNIP. We will also present the case of Department of Defense Architecture Framework (DoDAF) and how agility can be applied to the design and evaluation process.
- Published
- 2011
29. Integrated sensing and command and control system for disaster response
- Author
-
Andy Vidan and Gregory G. Hogan
- Subjects
Collaborative software ,Situation awareness ,Computer science ,computer.internet_protocol ,business.industry ,Net-centric ,Emerging technologies ,Law enforcement ,Service-oriented architecture ,Computer security ,computer.software_genre ,Concept of operations ,Systems architecture ,business ,computer - Abstract
Emergency responders fighting blazes and flooding, law enforcement securing sites and crowds, and medical teams treating victims are typical scenarios during rapidly-evolving, catastrophic events. The larger the disaster, the more complicated becomes the situation as thousands of responders from hundreds of organizations participate in the response and relief efforts. Organizing, coordinating and commanding these efforts remains a significant technical challenge, as it requires timely collection and distribution of information under harsh environments. With guidance from operational partners in California's emergency response community, we have designed, implemented and demonstrated a prototype integrated sensing and command and control system that enables shared situational awareness and collaboration during response operations. The system architecture is based on net-centric and service-oriented paradigms, and combines sensors, communications, and visualization and collaboration technologies, with all components being linked in (near) real-time. The utility of this prototype system was evaluated through a field exercise that tested the technical performance of the system and assessed the impact of new technologies on current concept of operations. In this paper, we describe the design analysis, system architecture, core enabling technologies, and the field evaluations.
- Published
- 2010
30. Mine Warfare (MIW) Community of Interest (COI) efforts towards the development of future data standards to enable a net-centric capability
- Author
-
Megan A. Cramer
- Subjects
Database ,Net-centric ,Computer science ,Interoperability ,computer.file_format ,Hierarchical Data Format ,computer.software_genre ,Data modeling ,Metadata ,Data Standard ,Data exchange ,Systems engineering ,Software architecture ,computer - Abstract
The U.S. Navy established the Mine Warfare (MIW) Community of Interest (COI) in 2007 to develop data strategies in support of a future information-based architecture for naval MIW. The MIW COI is actively pursuing standard data exchange as a mechanism to facilitate the creation of a future service oriented architecture (SOA) and improved interoperability within the MIW system-of-systems. Initiatives include publishing data standards to facilitate implementation of open architecture (OA) and net-centric approaches as well as the development of a Data Standards Guidebook to facilitate the generation of future standards. During the past year, the COI published the data standard for MIW Contacts and prepared a foundational structure and schema for a MIW sensor data format using the hierarchical data format (HDF) specification as a common approach to managing unstructured sensor data in support of post mission analysis (PMA). Looking forward, the COI is implementing a data model roadmap to manage the data standards generation process for MTW-relevant tactical, meteorological and environment data, and sensor data. The development of data standards directly enables technology insertion by providing inputs to algorithms and modules. The use of a standard format also reduces integration costs and risk through early communication of available data and associated metadata. The access to common data standards allows new technologies to be more easily analyzed and incorporated during the verification and validation (V&V) process. An agile approach to technology insertion, enabled by common data standards, will ultimately result in an improved future MIW capability.
- Published
- 2010
31. Resource Brokering Service: Automatic plan composition and execution
- Author
-
Ethan Aubin, Mark Ford, Daniel J. Van Hook, Magnus Ljungberg, and Robert Shaw
- Subjects
Service (systems architecture) ,Database ,Situation awareness ,Net-centric ,Computer science ,business.industry ,computer.file_format ,Dynamic priority scheduling ,computer.software_genre ,Shared resource ,Resource (project management) ,Workflow ,Information system ,Resource management ,Executable ,Software engineering ,business ,computer - Abstract
We address supporting unanticipated users and uses of limited information resources (sensors, databases, weapons -any resource intrinsically tied to digital information) in a timely and efficient fashion. Platform-centric systems often preclude users and uses not identified when the system was developed and deployed. Net-centric approaches, however, can address these problems by allowing services and information to be discovered and accessed at run-time. We have developed a Resource Brokering Service (RBS) that uses net-centric principles to enable multi-domain information and resource sharing and support for unanticipated users and uses. The RBS uses a modular software component framework for dynamically composing and tasking heterogeneous resources including sensors, data feeds, processors, archived data, networks, and even analysts into resilient, mission-oriented workflows. The RBS is applicable to multiple sense-decide-act military domains including missile defense, space situation awareness, ISR, border protection, and cyber defense. In this paper we give an overview of the concepts of the RBS and describe the process of transforming abstract plans to executable plans.
- Published
- 2010
32. Toward an integrated system for command and control net-centric web services and sustainment: Application to Homeland Security
- Author
-
Jeff Waters, Stuart H. Rubin, Marion G. Ceruti, Kevin Adams, and Sandi F. Lehan
- Subjects
Information management ,Decision support system ,Emergency management ,Computer science ,business.industry ,Net-centric ,Homeland security ,computer.software_genre ,Computer security ,Engineering management ,Command and control ,Web service ,business ,Software architecture ,computer - Abstract
This paper describes the architecture and requirements of an integrated system that is needed to support the command-and-control requirements of the Department of Homeland Security during crisis prevention, disaster relief, and other critical operations. The architecture is based on emerging science and technology that has been under development in information management. Lessons learned in the implementation of decision-support systems for Chemical, Biological, Radiological and Nuclear defense, standards, spiral-systems integration and implementation, and web-service-centric computing, contribute to the architecture's design. The theoretical underpinnings of such a system are represented using a formalistic approach called “paradigm reuse.”
- Published
- 2010
33. A net-centric XML based system of systems architecture for human tracking
- Author
-
Ferat Sahin and Ryan M. Bowen
- Subjects
System of systems ,business.industry ,computer.internet_protocol ,Net-centric ,Computer science ,Distributed computing ,Interoperability ,Tracking system ,External Data Representation ,XML framework ,Embedded system ,business ,Software architecture ,computer ,XML - Abstract
Human detection and tracking is a primary focus for visual surveillance systems. However, current systems for human tracking are often complex and require vast amounts of computing resources. A reduction in complexity of the overall tracking system can be achieved by using a System of Systems (SoS) architecture. Once formed, a SoS architecture must achieve desirable levels of interoperability and integration. Proposed in this paper is a human tracking system that uses a net-centric SoS architecture capable of detecting a human via video surveillance and subsequently providing coordinates for mobile robot tracking. This SoS architecture establishes integration and conceptual interoperability through the standardization of communication and data representation. Within the SoS, communication is accomplished using a client-server architecture while data is structured according to a custom XML framework. The resulting SoS is composed of decentralized independent systems inter-operating on heterogeneous platforms to achieve the ultimate goal of human tracking.
- Published
- 2010
34. Net-Centric Military to Civilian Transformation
- Author
-
Supriya Ghosh
- Subjects
Transformation (function) ,Net-centric ,Computer science ,Computer security ,computer.software_genre ,computer - Abstract
This chapter focuses broadly on the technology effects of the net-centric transformation on our industry and civilian market. We start by discussing aspects of command and control principles, how it has run its course within the military and how the hierarchical nature is changing to embrace a matrixed decision making process. We then discuss the evolution of net-centric principles and how the government contracting and civilian industry is being affected by this transformation. We then discuss specific details on DoD to civilian technology transfer. A broad set of industry topics are then discussed and is categorized based on net-centric needs. Then we provide a glimpse into upcoming industry technology areas that have shown promise. We end with a perspective from a guest author, who provides an industry perspective on the use of net-centric concepts and proliferation of net-centric computing. This chapter continues on our transformation perspectives, and steps through the net-centric future from a system perspective. We first review the current nature of the DoD that has worked based on a command and control structure. This then is giving way to the net-centric mechanisms for systems operations. We examine the net-centric transformation from the military to the civilian community and commercial marketplace. It is important to look at defense to commercial technology transfer principles. Then examine how current command and control systems run by government contractors are shifting their focus to net-centric principles. It is also important to figure out how commercial entities are taking advantage of net-centric concepts within the computer and communications industry. There has been an emergence of “Net-Centric Computing” as a concept that we further explore. The types of technologies that are involved in the computing and communications infrastructure are discussed. We then provide a guest author perspective as an industry subject matter expert on the net-centric transformation and industry initiatives.
- Published
- 2010
35. Cooperative anti-submarine warfare at NURC moving towards a net-centric capability
- Author
-
Christopher Strode, John R. Potter, David T. Hughes, and Robert Been
- Subjects
medicine.medical_specialty ,Engineering ,Anti-submarine warfare ,Net-centric ,business.industry ,Interoperability ,Computer security ,computer.software_genre ,Sonar ,Research centre ,Scalability ,medicine ,Electronic warfare ,business ,Autonomous system (mathematics) ,computer - Abstract
The NATO Undersea Research Centre (NURC) conducts research on off-board Low Frequency Active (LFA) sensors for use in Cooperative distributed ASW (CASW). The objective is to create a scalable and autonomous system that removes vulnerable personnel from the vicinity of high risk, is cheaper than conventional ship-based sonar and that potentially leverages the benefits of multi-static operations by creating an increased diversity of assets and spatial distribution. Such systems would also release personnel to perform tasks elsewhere. The NURC intends to prototype an open-architecture system with a high degree of interoperability in a concept demonstration in 2012.
- Published
- 2010
36. Building net-centric data strategies in support of a transformational MIW capability
- Author
-
M. A. Cramer and Jason R. Stack
- Subjects
Engineering management ,Transformational leadership ,Operations research ,Process (engineering) ,Virtual machine ,Computer science ,Net-centric ,Business model ,Architecture ,computer.software_genre ,computer ,Data modeling - Abstract
The Mine Warfare (MIW) Community of Interest (COI) was established to develop data strategies in support of a future information-based architecture for naval MIW. As these strategies are developed and deployed, the ability for these datafocused efforts to enable technology insertion is becoming increasingly evident. This paper explores and provides concrete examples as to the ways in which these data strategies are supporting the technology insertion process for software-based systems and ultimately contribute to the establishment of an Open Business Model virtual environment. It is through the creation of such a collaborative research platform that a truly transformation MIW capability can be realized.
- Published
- 2010
37. Metrics for measuring net-centric data strategy implementation
- Author
-
Joseph B. Kroculick
- Subjects
Strategy implementation ,Decision support system ,Process management ,Net-centric ,Computer science ,Business process ,Dashboard (business) ,Metric (unit) ,Data mining ,computer.software_genre ,computer ,Enterprise data management - Abstract
An enterprise data strategy outlines an organization's vision and objectives for improved collection and use of data. We propose generic metrics and quantifiable measures for each of the DoD Net-Centric Data Strategy (NCDS) data goals. Data strategy metrics can be adapted to the business processes of an enterprise and the needs of stakeholders in leveraging the organization's data assets to provide for more effective decision making. Generic metrics are applied to a specific application where logistics supply and transportation data is integrated across multiple functional groups. A dashboard presents a multidimensional view of the current progress to a state where logistics data shared in a timely and seamless manner among users, applications, and systems.
- Published
- 2010
38. Transitioning to Net-Centric Systems
- Author
-
Fred C. Briggs
- Subjects
Engineering ,business.industry ,Net-centric ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Context (language use) ,Computer security ,computer.software_genre ,IPv6 ,law.invention ,Engineering management ,law ,Synchronization (computer science) ,Internet Protocol ,Architecture ,business ,Set (psychology) ,computer - Abstract
This paper investigates the U.S. Department of Defense (DoD) plans and progress to transition to Net-Centric systems and researches some of the issues and challenges in reaching a Net-ready goal. These include tasks such as converting to a service-oriented architecture, transitioning from Internet Protocol (IP) version 4 to IPv6, and establishing a common set of architectural and network standards. It focuses on U.S. Naval Aircraft communications and command systems efforts to transition from platform-specific to NetCentric systems and provides an information base for project managers and engineers working in this area. I. What does Net-Centric Systems/Warfare in DoD mean? Net-Centric in a DoD context means being a part of a continuously-evolving, complex community of people, devices, information, and services interconnected by a communications network to achieve optimal benefit of resources and services for the warfighter and better synchronization of events and their consequences.
- Published
- 2010
39. Towards Net-Centric Cyber Survivability for Ballistic Missile Defense
- Author
-
J.W. Haines, John Truelove, Orton Huang, Michael N. Gagnon, and Apu Kapadia
- Subjects
Engineering ,Net-centric ,computer.internet_protocol ,business.industry ,Ballistic missile ,Survivability ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Service-oriented architecture ,Computer security ,computer.software_genre ,Information warfare ,OODA loop ,Software system ,Architecture ,business ,computer - Abstract
The United States Department of Defense (DoD) is engaged in a mission to unify its software systems towards a “net-centric” vision—where commanders gain advantage by rapidly producing, consuming, and sharing information using service oriented architectures (SOAs). In this paper, we study the cyber survivability of mission-critical net-centric systems, focusing on Ballistic-Missile-Defense (BMD) systems. We propose a net-centric architecture for augmenting the survivability of critical DoD net-centric systems. Our architecture draws inspiration from several theories of warfare, focusing on the goal of giving cyber commanders “decision superiority.” Our architecture prescribes a net-centric decision-support system that implements the Cyber OODA loop (the cycle of observing, orienting, deciding, and acting within the cyber domain). We present an illustration-of-concept prototype implementation, and describe its role in a ballistic-missile exercise. We relate our experiences from this exercise and suggest future directions towards achieving net-centric cyber survivability.
- Published
- 2010
40. Enhancing C4I Security Using Threat Modeling
- Author
-
Gul Faraz Khan, Abdullah S. Alghamdi, and Tazar Hussain
- Subjects
Security service ,Computer science ,Net-centric ,Threat model ,Information system ,Systems design ,Adversary ,Asset (computer security) ,Computer security ,computer.software_genre ,computer ,Threat - Abstract
C4I (command, control, communications, computer and intelligence) system is a complex system of systems that enables the military commander to achieve decision superiority by affecting adversary’s information and information based processes while protecting one‘s own information systems. Owing to the sensitivity of military information the security threats to C4I systems are real and growing therefore security is a major challenge in order to maintain integrity, confidentiality, availability and accountability. Different Models and architectures frameworks e.g. DODAF, CDSA have been proposed which decompose the detail structure of C4I systems however these models and frameworks do not provide mechanism to capture associated security risks and issues. Threat modeling is the process to understand different ways system can be attacked which helps towards secure system design and implement countermeasures. This paper suggests that using threat modeling could help to eradicate or reduce the effect of advancing threats to C4I systems. In this paper we also identify how security can be modeled in top down manner e.g. from architecture level to lower level of modeling so that countermeasures can be incorporated on system level rather than on bit by bit basis.
- Published
- 2010
41. Need-to-know vs. need-to-share: the net-centric dilemma
- Author
-
Renato Levy and Margaret Lyell
- Subjects
Knowledge representation and reasoning ,Computer science ,business.industry ,Net-centric ,Information architecture ,Information policy ,Computer security ,computer.software_genre ,Information assurance ,Information protection policy ,Metadata ,Data access ,Need to know ,Scalability ,Information technology architecture ,The Internet ,Data architecture ,business ,computer - Abstract
In Net-centric operations the timely flow of the correct information to the mission partners is fundamental for the success of the endeavor. Yet, as we strive to work in multi-agencies and multi-national coalitions it is important to control the flow of information. This is the information assurance net-centric dilemma. How to speed the flow of information while keeping the necessary access boundaries? Current multi-level security and role base access strategies and their derivatives control the flow of data, but fail to implement higher levels of information policy. We propose an architecture capable of supporting the solution of the Net-Centric dilemma. This architecture, distributed and scalable, is compatible with Air Force's Metadata Environment initiative (MDE). In the proposed architecture the metadata tagged data items are used to construct a semantic map of how the information items are associated. Using this map, policy can be applied to information items. Provided the policy is logically based, reasoners can be used to identify not only if the person soliciting the data item has rights to receive it but also what kind of information can be derived from this data based on information retrieved previously. The full architecture includes the determination of which information can be relayed or not at any given time, as well as all the required mechanisms for enforcement including identification of potential intentional fraudulent actions. The proposed architecture is extensible and does not require any specific policy language or reasoner to be effective. Multiple approaches can be simultaneously present in the system.
- Published
- 2009
42. Net-centric transformation to empower the war-fighter through enhanced enterprise data services: exploring the SOA approaches
- Author
-
Deborah L. Farroha and Bassam S. Farroha
- Subjects
Process management ,ComputingMilieux_THECOMPUTINGPROFESSION ,business.industry ,Net-centric ,Computer science ,Information sharing ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Computer security ,computer.software_genre ,Enterprise data management ,Spanish Civil War ,Information technology management ,Enhanced Data Rates for GSM Evolution ,Data as a service ,business ,computer ,Data virtualization - Abstract
As DoD moves towards an Enterprise approach to IT, CIOs have been lauding SOA as the solution. It is clear that SOA addresses many challenges that face the DoD from information sharing to the fiscal issues of maintaining an IT infrastructure. As SOA is applied to more complex tasks and as we move IT out to the tactical edge there is an increased need to ensure access to the right information, in the right place at the right time. This paper explores the various methodologies of data services that are making SOA an accessible reality DoD.
- Published
- 2009
43. Net Centric Sense and Avoid
- Author
-
Cristina Barrado, Jorge Ramirez, and Enric Pastor
- Subjects
Sense and avoid ,Net-centric ,Computer science ,Computer security ,computer.software_genre ,computer - Published
- 2009
44. A Method for Dynamic NCW Service Selection Based on EA Ontology
- Author
-
Sang-Kyu Hwang, Young-Tae Byun, and Kwang-Je Lee
- Subjects
Service (systems architecture) ,business.industry ,Net-centric ,computer.internet_protocol ,Computer science ,Global Information Grid ,Enterprise architecture ,Service-oriented architecture ,Ontology (information science) ,computer.software_genre ,Information warfare ,Intelligent Network ,Grid computing ,Information system ,Software architecture ,Software engineering ,business ,computer ,Reference model - Abstract
Service-Oriented Computing(SOC) becomes nowadays the core computing paradigm that utilizes services as fundamental elements for executing Information Warfare. In the Depart of Defense(DoD), the main goal of SOC is that all available information resources crowd into a network, so called ‘Global Information Grid(GIG)’ for Net Centric Warfare(NCW), with little effort for network centric services. For achieving the goal, Defense Information Systems Agency(DISA)'s Net-Centric Enterprise Services(NCES) project has a development budget of $37.2 million and an operating budget of $89.9 million for fiscal year 2009[1]. With increasing emphasis on SOC, the automatic service binding method becomes a hot issue in SOC. This paper proposes a new approach of using the DoD Enterprise Architecture Reference Models(DoD EA RM) as a mid-level ontology to support an automatic NCW service binding for a business-level service composition.
- Published
- 2009
45. Service Oriented Decentralized Access Control for Military Systems in Net-Centric Environment
- Author
-
Xiao Qian, Wang Hou-xiang, Han Ruo-fei, Li Hui, and Jing Xiao-Pei
- Subjects
Authentication ,Service (systems architecture) ,computer.internet_protocol ,Net-centric ,Computer science ,business.industry ,Access control ,Service-oriented architecture ,Computer security ,computer.software_genre ,Decentralised system ,Architecture framework ,Software architecture ,business ,computer - Abstract
Department of Defense (DoD) of USA has proposed new architecture framework (DoDAF v1.5) recently to guide the development of new military systems. Net-Centric Environment (NCE) and Service Oriented Architecture are highlighted in it. In order to ensure the security of the future military systems, a service oriented decentralized access control (SODAC) model is proposed. Detailed construction and formal definition are given. With the model, authentication will be processed at the entity end to implement decentralized control. At last, related issues, analysis and implementation of the model are discussed.
- Published
- 2009
46. Network management in net-centric systems
- Author
-
A.R. Choudhary
- Subjects
Engineering ,business.industry ,Net-centric ,Network security ,Data management ,Computer security ,computer.software_genre ,Security information and event management ,Network management ,Risk analysis (engineering) ,Systems management ,Element management system ,Network security policy ,business ,computer - Abstract
Large net-centric systems are emerging both in the defense and civilian sectors in the USA. Examples include the global information grid (GIG) and the national security emergency preparedness (NS/EP) programs. There are some common features of such systems from the point of view of network management. This paper documents these common features and the network management requirements that they imply. The paper also researches the technologies that are needed to meet these requirements, and analyzes their readiness with respect to the capabilities needed to fulfill the network management requirements. A gap exists between the needed network management capabilities and what the current technologies can provide. This gap poses a problem for the emerging net-centric systems, the research communities in the network and service management, and the industry that provides the needed products.
- Published
- 2008
47. Coordinating the Global Information Grid Initiative with the NG9-1-1 Initiative
- Author
-
M. Schmitt
- Subjects
Engineering management ,Grid computing ,Net-centric ,Global Information Grid ,Rank (computer programming) ,Interoperability ,Military computing ,Business ,computer.software_genre ,Computer security ,computer - Abstract
As the Department of Defense develops the Global Information Grid, the Department of Transportation develops the Next Generation 9-1-1 system. Close examinations of these initiatives show that the two are similar in architectures, applications, and communications interoperability. These similarities are extracted from the lowest user level to the highest commander rank that will be involved in each network. Once the similarities are brought into perspective, efforts should be made to collaborate between the two departments.
- Published
- 2008
48. Case study: Net-centric mission threads modeling and analysis using BPMN
- Author
-
P.P. Jain and B. Pridemore
- Subjects
computer.internet_protocol ,Net-centric ,business.industry ,Computer science ,Interoperability ,Service-oriented architecture ,computer.file_format ,Business process modeling ,computer.software_genre ,Business Process Model and Notation ,Systems architecture ,Operating system ,Executable ,Software architecture ,Software engineering ,business ,computer - Abstract
Fast growing COTS support of converging service oriented architecture (SOA) and business process modeling (BPM) standards provide the DOD with an excellent opportunity to improve its process to develop integrated operational and system architectures for net centric warfare capabilities. Mission threads, widely identified as a desirable method to capture DOD acquisition requirements, modeled in a machine- executable form, can validate and verify (V&V) operational performance early in the acquisition process. Available cost effective COTS solutions automate the integration of executable mission models providing agility and speed to that V&V process. This enables mission thread collaborative development, successive simultaneous refinements (by various stakeholders), and early simulation based verifications of innovative information flow strategies, which are now implementable via Global Information Grid (GIG) capabilities. Mission threads currently use various non-executable (static) documents such as Microsoft Officereg products, Microsoft Visioreg files, Unified Modeling Language (UML) sequence diagrams and/or DoDAF (DOD Architecture Framework) products. These documentation methods served well for Threat Based Acquisition, where the mission threads were primary defined early in the acquisition process. However, thes e methods are not adequate in dealing with the evolving net centric mission thread complexities arising from concurrent execution of operational activities, systems, and communication channels. Additionally, the acquisition process requires constant improvement and refinement to the mission threads developed in the beginning of the process. The GIG provides an opportunity to push and/or pull data, information, and knowledge to/from various data producers and consumers and enables valuable information to get to the right place at the right time. The GIG allows altering information strategies based on the situation awareness of mission and the infrastructure and allows the commander to post his intent. Data sources can respond by providing relevant information to the commander. These alternative information flow strategies must be evaluated and validated prior to the material acquisition by the DOD. This case study experiments were performed with the BPMN (Business Process Modeling Notation) standard, developed for B2B (Business-to-Business) Enterprise interactions, to model and simulate information flow in the GIG mission threads. The experiments used inexpensive BPMN standards-based COTS tools to model and analyze alternative F2T2 (Find, Fix, Track, Target) information flow strategies for a well known DOD TST (Time-Sensitive-Targeting) mission thread. The case study concludes that COTS tools, such as iGraFx Process 2006 for Six Sigma, are cost effective implementations of the BPMN standard and have reached the maturity level required to meet the technology needs of DOD net centric mission thread modeling and simulation-based quantitative analysis. Other COTS tools, such as Minitab, can readily be applied for statistical analysis at the mission level. The case study analysis also offers a means to project the operational capacity of the current operational and system architecture in terms of the maximum number of targets that can be engaged within the TST time constraints. Dr. Prem Jain is supporting Joint Interoperability Test Command (JITC) to Research and Develop new methods and technologies, needed to support GIG Test and Evaluation (T&E). He joined MITRE in October 2005 from BAE Systems "Center for Transformation". He has spent over 20 years in Electronic Design Automation industry and was the CEO of the company"Cynergy System Design/ CAE Plus", which developed "System on a Chip" architecture analysis and architectural synthesis tools using its patented graphical executable language, synthesis algorithms and synchronous time sliced simulation. During 1988-1992, he was a faculty member in the Computer Science department of University of Texas in Austin. He received his B. Tech in EE from Indian Institute of Technology, Kanpur, India, Masters and PhD is in EE from Rensselaer Polytechnic Institute, Troy, New York.
- Published
- 2008
49. Net-centric collaboration and situational awareness with an advanced User-Defined Operational Picture (UDOP)
- Author
-
J. Loomis, Rob White, R. Porter, A. Hittle, and C. Desai
- Subjects
Collaborative software ,Knowledge management ,Situation awareness ,Net-centric ,business.industry ,computer.internet_protocol ,Computer science ,Service-oriented architecture ,computer.software_genre ,Common operational picture ,Command and control ,UDOP ,Web service ,business ,computer - Abstract
Historically, government organizations have developed "operations centers " as hubs for command and control functions. Over the past decade there has been significant interest in shared situational awareness and collaboration as well as improvement in networking capabilities of these organizations, which has resulted in concepts and terms such as common operational picture, common relevant operational picture, and user-defined operational picture. These 'pictures' make operational information available directly to an individual's desktop (outside the operations centers). This paper defines and introduces the technology concepts for a user-defined operational picture (UDOP) that enable collaboration by providing visual situational awareness to end-users working within an operational network-centric environment that is offering an increasing number of Web service-enabled information sources. UDOPs are created, visualized, augmented, tailored, and shared by the organization to enhance situational awareness and support collaborative and hierarchical decision-making. The UDOP architecture supports 2D, 3D, and 4D (3D + time) visualization using COTS technologies. Implementation of a robust and flexible UDOP system relies on several key system design patterns that include service oriented architecture (SOA), plug-in mechanisms, layer/filter models, and loose coupling. This paper will also describe one reference implementation of a UDOP system by reviewing an operationally deployed capability called global awareness presentation services (GAPS).
- Published
- 2008
50. AGSOA ¿ Agile Governance for Service Oriented Architecture (SOA) Systems: A Methodology to Deliver 21st Century Military Net-Centric Systems of Systems
- Author
-
Elliot B. Sloane, S. Metzger, and R. Beck
- Subjects
System of systems ,Engineering ,Agile usability engineering ,Net-centric ,business.industry ,computer.internet_protocol ,Agile Unified Process ,Service-oriented architecture ,SOA governance ,Software_SOFTWAREENGINEERING ,Systems engineering ,System of systems engineering ,business ,computer ,Agile software development - Abstract
This paper describes AGSOA, an agile governance for service oriented architectures (SOAs) that is intended to address many of the inherent challenges faced by implementing the DoD's 21s' Century agile net-centric warfare systems using SOAs. The complex interdependencies within SOA-based systems, when combined with DoD's desired agile change capabilities, creates a very complex and open-ended system of systems environment that cannot simply modeled, simulated, verified and/or validated. The AGSOA framework is designed to blend elements of proven agile- style project management methodologies with contemporary SOA governance strategies used in other, less complex industries to yield a more appropriate governance strategy for life- and mission-critical DoD SOA projects.
- Published
- 2008
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.