The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We describe a framework for capturing data provenance information to support Information assurance attributes like availability, authentication, confidentiality, integrity and non-repudiation. Our approach is applicable to multi-level secure systems where it is not always possible to directly provide data source and data transformation information. We achieve this by combining the subjective and objective...
Faced with intense competition, network service providers, supported by their respective network operations centers (NOCs), must ensure the best possible quality of service (QoS) and corresponding quality of experience (QoE) for end-users or face the loss of business. QoE represents the perception of quality experienced by end-users of a real-time system, such as VoIP. The QoE challenge becomes significant...
Three primary objectives of the Joint Program Executive Officer (JPEO) Joint Tactical Radio System (JTRS) are: (a) reduce time to field capability, (b) improve interoperability between services, and (c) decrease radio production costs. The Software Communications Architecture (SCA) specification is the architectural framework for all JTRS software artifacts that was created to maximize software application...
A recent feasibility study suggests that a Service Oriented Architecture (SOA) will be central within the NATO Network Enabled Capabilities information infrastructure. An important element of a SOA is the service discovery process, but existing solutions are not sufficient in military networks. We suggest to use a robust Peer-to-Peer (P2P) network as a complement. Unfortunately, available P2P search...
Daily sensor data volumes are increasing from gigabytes to multiple terabytes. The manpower and resources needed to analyze the increasing amount of data are not growing at the same rate. Current volumes of diverse data, both live streaming and historical, are not fully analyzed. Analysts are left mostly to analyzing the individual data sources manually. This is both time consuming and mentally exhausting...
With the increasing size and complexity of emerging military communication networks, low footprint emulation methods are required to evaluate protocols, algorithms and user performance. In this paper we describe a new emulation architecture that is scalable, modular, and responds to real-time changes in topology and link characteristics. We use this scalable emulation testbed to evaluate system performance...
While SOA promises great benefits in productivity and flexibility, the tools for securing these systems continue to lag behind. The ideal of SOA security is to provide trusted containers and frameworks that enforce policies established during deployment, and remove security logic and policy from application code completely. Standards such as WS-Security address some of the issues, but enterprise systems...
The platforms and gateways that compose the Airborne Network (AN) exhibit a high degree of heterogeneity, with a variety of IP and non-IP data links hosted on various terminals produced by multiple manufacturers. The lack of an accepted, mature network management architecture for the AN contributes to the risk that there will be a proliferation of separate, stovepiped tools deployed to monitor and...
Many Programs of Record are using Service Oriented Architecture (SOA) approaches and supporting technologies to realize net-centricity requirements. Furthermore, emerging solutions offer data sharing across adjacent security enclaves for these programs, including Cross Domain Joint Battlespace Infosphere (XJBI) by AFRL, Cross Domain Web Services Gateway by DISA, and the Cross Domain Collaborative...
This purpose of this paper is to document an architectural validation approach for the Government Reference Architecture (GRA) for SATCOM terminals. The approach integrates the Virginia Tech OSSIE SCA Core Framework with a UML model of the GRA, coupled with low-fidelity models of the SATCOM components. This approach uses the Rhapsody tool to implement the GRA-based testbed from documentation through...
The net-centric vision for the global information grid (GIG) includes evolution toward Internet protocol (IP) based services. IP service profiles and in-service traffic flows in support of Warfighters in evolving deployments are highly variable, with end-to-end (E2E) flows typically spanning both terrestrial and satellite communications (SATCOM) networks. Communications planning, management and control...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.