Accession Number:

ADA503643

Title:

Security Policy Automation - from Specification to Device Configuration

Descriptive Note:

Conference paper

Corporate Author:

HONEYWELL LABORATORIES GOLDEN VALLEY MN

Report Date:

2008-12-01

Pagination or Media Count:

9.0

Abstract:

To achieve the potential of network centric warfare the Army must securely share information across US operational units and with coalition partners while at the same time denying our enemies access to sensitive information. The sheer number of configuration parameters necessary to achieve such secure interoperability and optimal data sharing creates the opportunity for human error and slows the deployment process. Furthermore, the underlying security policies may be dynamic due to changing missions, changing coalition partner relationships and compromise of devices. Finally, the MANET environment is often bandwidth limited, links are sometimes intermittent and end-to-end connectivity is not always possible.

Subject Categories:

  • Information Science
  • Computer Systems
  • Cybernetics
  • Military Operations, Strategy and Tactics

Distribution Statement:

APPROVED FOR PUBLIC RELEASE