Vis enkel innførsel

dc.contributor.authorGkioulos, Vasileios
dc.contributor.authorWolthusen, Stephen
dc.date.accessioned2017-12-07T12:15:53Z
dc.date.available2017-12-07T12:15:53Z
dc.date.created2017-08-15T09:12:02Z
dc.date.issued2017
dc.identifier.citationAdvances in Intelligent Systems and Computing. 2017, 611 310-322.nb_NO
dc.identifier.issn2194-5357
dc.identifier.urihttp://hdl.handle.net/11250/2469549
dc.description.abstractThe requirement for enabling network centric warfare through the accommodation of network-enabled capabilities, promoted the use of service oriented architectures (SOA) within military networks. The initial response of the academic and industrial communities was to utilize standard enterprise SOA. The developed solutions were well adjusted to the strategic domain, where node and network constraints were minimal. Yet, experience gained from the battlefields of the last decade, has proven that the tactical domain imposes a set of unique constraints, that render such solutions inefficient for the tactical edge. The project TACTICS, supported by the European Defense Agency, focuses on the study and development of a SOA dedicated to tactical networks. In this paper we present the designed security service architecture, as developed in accordance to the requirements identified in our earlier studies. Each service is presented as an architectural element within the TACTICS TSI (Tactical Service Infrastructure), aiming to highlight the distinct functionalities of the security infrastructure towards the efficient enforcement of security controls at the tactical edge.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleSecurity Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017nb_NO
dc.typeChapternb_NO
dc.description.versionsubmittedVersionnb_NO
dc.source.pagenumber310-322nb_NO
dc.source.volume611nb_NO
dc.source.journalAdvances in Intelligent Systems and Computingnb_NO
dc.identifier.doi10.1007/978-3-319-61566-0_29
dc.identifier.cristin1486234
dc.description.localcodeThis is a pre-print of a paper published in [Conference on Complex, Intelligent, and Software Intensive Systems]. The final authenticated version is available online at: https://link.springer.com/chapter/10.1007%2F978-3-319-61566-0_29nb_NO
cristin.unitcode194,18,21,80
cristin.unitnameNorwegian Information Security Lab
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel