dc.contributor.author | Gkioulos, Vasileios | |
dc.contributor.author | Wolthusen, Stephen | |
dc.date.accessioned | 2017-12-07T12:15:53Z | |
dc.date.available | 2017-12-07T12:15:53Z | |
dc.date.created | 2017-08-15T09:12:02Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Advances in Intelligent Systems and Computing. 2017, 611 310-322. | nb_NO |
dc.identifier.issn | 2194-5357 | |
dc.identifier.uri | http://hdl.handle.net/11250/2469549 | |
dc.description.abstract | The requirement for enabling network centric warfare through the accommodation of network-enabled capabilities, promoted the use of service oriented architectures (SOA) within military networks. The initial response of the academic and industrial communities was to utilize standard enterprise SOA. The developed solutions were well adjusted to the strategic domain, where node and network constraints were minimal. Yet, experience gained from the battlefields of the last decade, has proven that the tactical domain imposes a set of unique constraints, that render such solutions inefficient for the tactical edge.
The project TACTICS, supported by the European Defense Agency, focuses on the study and development of a SOA dedicated to tactical networks. In this paper we present the designed security service architecture, as developed in accordance to the requirements identified in our earlier studies. Each service is presented as an architectural element within the TACTICS TSI (Tactical Service Infrastructure), aiming to highlight the distinct functionalities of the security infrastructure towards the efficient enforcement of security controls at the tactical edge. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.title | Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017 | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | submittedVersion | nb_NO |
dc.source.pagenumber | 310-322 | nb_NO |
dc.source.volume | 611 | nb_NO |
dc.source.journal | Advances in Intelligent Systems and Computing | nb_NO |
dc.identifier.doi | 10.1007/978-3-319-61566-0_29 | |
dc.identifier.cristin | 1486234 | |
dc.description.localcode | This is a pre-print of a paper published in [Conference on Complex, Intelligent, and Software Intensive Systems]. The final authenticated version is available online at: https://link.springer.com/chapter/10.1007%2F978-3-319-61566-0_29 | nb_NO |
cristin.unitcode | 194,18,21,80 | |
cristin.unitname | Norwegian Information Security Lab | |
cristin.ispublished | true | |
cristin.fulltext | preprint | |
cristin.qualitycode | 1 | |