S. Calo, D. Wood, P. Zerfos, D. Vyvyan, Patrick Dantressangle, G. Bent
{"title":"联合网络的联合与互操作技术","authors":"S. Calo, D. Wood, P. Zerfos, D. Vyvyan, Patrick Dantressangle, G. Bent","doi":"10.4018/978-1-61520-855-5.CH006","DOIUrl":null,"url":null,"abstract":"When data from two or more coalition members is used in a joint mission, the flow of any information over the respective networks must be tightly controlled. Data sent over the networks would be routed through nodes that should enforce policies concerning: what information about each coalition member's assets will be exchanged with other coalition members; who, with what authentication, and under what conditions can access the information, and in what form it can be provided. We discuss the requirements of such a policy-enabled federated network, in which any node could be responsible for enforcement of all policies applicable to it and the data that flows through it. We describe the high-level architecture of the system currently under development, and the design trade-offs that were made to balance ease of deployability and flexibility in policy enforcement. We also present our initial implementation with performance evaluation results that showcase its applicability to the scenario considered.","PeriodicalId":143243,"journal":{"name":"2009 12th International Conference on Information Fusion","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"Technologies for federation and interoperation of coalition networks\",\"authors\":\"S. Calo, D. Wood, P. Zerfos, D. Vyvyan, Patrick Dantressangle, G. Bent\",\"doi\":\"10.4018/978-1-61520-855-5.CH006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When data from two or more coalition members is used in a joint mission, the flow of any information over the respective networks must be tightly controlled. Data sent over the networks would be routed through nodes that should enforce policies concerning: what information about each coalition member's assets will be exchanged with other coalition members; who, with what authentication, and under what conditions can access the information, and in what form it can be provided. We discuss the requirements of such a policy-enabled federated network, in which any node could be responsible for enforcement of all policies applicable to it and the data that flows through it. We describe the high-level architecture of the system currently under development, and the design trade-offs that were made to balance ease of deployability and flexibility in policy enforcement. We also present our initial implementation with performance evaluation results that showcase its applicability to the scenario considered.\",\"PeriodicalId\":143243,\"journal\":{\"name\":\"2009 12th International Conference on Information Fusion\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-07-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 12th International Conference on Information Fusion\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-61520-855-5.CH006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 12th International Conference on Information Fusion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-61520-855-5.CH006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Technologies for federation and interoperation of coalition networks
When data from two or more coalition members is used in a joint mission, the flow of any information over the respective networks must be tightly controlled. Data sent over the networks would be routed through nodes that should enforce policies concerning: what information about each coalition member's assets will be exchanged with other coalition members; who, with what authentication, and under what conditions can access the information, and in what form it can be provided. We discuss the requirements of such a policy-enabled federated network, in which any node could be responsible for enforcement of all policies applicable to it and the data that flows through it. We describe the high-level architecture of the system currently under development, and the design trade-offs that were made to balance ease of deployability and flexibility in policy enforcement. We also present our initial implementation with performance evaluation results that showcase its applicability to the scenario considered.