DOC PREVIEW
UConn CSE 3000 - Information Sharing and Security

This preview shows page 1-2-3-4-5-6-41-42-43-44-45-46-84-85-86-87-88-89 out of 89 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 89 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Information Sharing and Security in Dynamic CoalitionsOverview of PresentationCrisis and CoalitionsNear Simultaneous CrisesCrises in 2005Emergent Need for CoalitionsThe Dynamic Coalition Problem (DCP)Supporting Advanced Applications DCP Objectives for CrisisDCP: Coalition ArchitectureDCP Joint and Combined Information FlowDCP: Combined Information FlowDCP: Coalition Artifacts and Information Flow – Military EngagementDCP: Coalition Artifacts and Information Flow – Civilian EngagementSlide 14Slide 15Slide 16Slide 17Slide 18Slide 19Slide 20Slide 21Slide 22Slide 23Slide 24Slide 25Slide 26Slide 27Slide 28Slide 29Slide 30Slide 31DCP: Global Command and Control SystemDCP: Global Command and Control SystemSlide 34DCP: Critical RequirementsGCCS Shortfalls: User RolesNon-Military Crisis: User RolesGCCS Shortfalls: Time Controlled AccessNon-Military Crisis: Time Controlled AccessGCCS Shortfalls: Value Based AccessNon-Military Crisis: Value Based AccessGCCS Shortfalls: Federation NeedsNon-Military Crisis: Federation NeedsInformation Sharing and Security Federated ResourcesInformation Sharing and Security Syntactic ConsiderationsInformation Sharing and Security Semantics ConcernsInformation Sharing and Security Syntactic & Semantic ConsiderationsInformation Sharing and Security Pragmatics IssuesSlide 49Information Sharing and Security Pragmatics IssuesInformation Sharing and Security Data IntegrityInformation Sharing and Security Discretionary Access ControlInformation Sharing and Security Role Based Access ControlInformation Sharing and Security Mandatory Access ControlInformation Sharing and Security Other IssuesA Service-Based Security ArchitectureRequired Security ChecksStepping Back Security for Distributed EnvironmentsSecurity for Distributed ApplicationsDC for Military Deployment/EngagementDC for Medical EmergencySecurity Issues: Confidence in SecuritySecurity for CoalitionsFour Categories of QuestionsSoftware Development Process QuestionsSlide 66Information Access and Flow QuestionsSlide 68Security Handlers/Processing QuestionsSecurity Handlers/Processing QuestionsSlide 71Legacy/COTS Applications QuestionsFocusing on MAC, DAC and RBACLegacy/COTS ApplicationsA Distributed Security FrameworkSlide 76Interactions and DependenciesPolicy Definition, Planning, ManagementThree-Pronged Security EmphasisSecure Software Design - T. DoanRBAC/MAC at Design LevelSecure Software Design - J. PavlichAspects for Security in UMLA Role-Slice for ProfessorsA Role Slide for StudentsMiddleware-Based Security - C. PhillipsProcess-Oriented ViewSecurity for XML DocumentsConcluding RemarksDCP-1CSE5095 Information Sharing and Security in Information Sharing and Security in Dynamic CoalitionsDynamic CoalitionsSteven A. Demurjian Computer Science & Engineering Department371 Fairfield Road, Box U-2155The University of ConnecticutStorrs, Connecticut 06269-2155http://www.engr.uconn.edu/[email protected] of PresentationOverview of PresentationThe Dynamic Coalition ProblemThe Dynamic Coalition ProblemCivilian OrganizationsMilitary Involvement/GCCSInformation Sharing and SecurityInformation Sharing and SecurityFederating ResourcesData IntegrityAccess Control (DAC and MAC)Other Critical Security IssuesStepping BackStepping BackSecurity Issues for Distributed and Component-Based ApplicationsConclusions and Future WorkConclusions and Future WorkDCP-3CSE5095Crisis and CoalitionsCrisis and CoalitionsA A Crisis Crisis is Any Situation Requiring National or is Any Situation Requiring National or International Attention as Determined by the International Attention as Determined by the President of the United States or UN President of the United States or UN A A CoalitionCoalition is an Alliance of Organizations: is an Alliance of Organizations: Military, Civilian, International or any Military, Civilian, International or any CombinationCombinationA A Dynamic CoalitionDynamic Coalition is Formed in a Crisis and is Formed in a Crisis and Changes as Crisis Develops, with the Key Concern Changes as Crisis Develops, with the Key Concern Being the Most Effective way to Solve the CrisisBeing the Most Effective way to Solve the CrisisDynamic Coalition ProblemDynamic Coalition Problem (DCP) is the Inherent (DCP) is the Inherent Security, Resource, and/or Information Sharing Security, Resource, and/or Information Sharing Risks that Occur as a Result of the Coalition Being Risks that Occur as a Result of the Coalition Being Formed QuicklyFormed QuicklyDCP-4CSE5095Near Simultaneous CrisesNear Simultaneous CrisesShip Wreck(UK,SP)Olympic GamesBOSNIA(NATO)KOSOVO(US,UK)Earthquake(United Nations)Crisis PointNATO HqDCP-5CSE5095Crises in 2005Crises in 2005Tidal Wave in Southeast AsiaTidal Wave in Southeast AsiaHurricanes in USHurricanes in USKatrina – Louisiana and MississippiRita – Texas and LouisianaMudslides in Guatemala Mudslides in Guatemala Earthquake in Pakistan/IndiaEarthquake in Pakistan/IndiaKey QuestionsKey QuestionsHow do we React to Such Crises?What is Potential Role for Computer Scientists and Engineers in Process?Can we Automate the Interactions Required for the Critical Computing Infrastructure?DCP-6CSE5095Emergent Need for CoalitionsEmergent Need for Coalitions““Coalitions must be flexible and no one coalition is Coalitions must be flexible and no one coalition is or has the answer to all situations.”or has the answer to all situations.”»Secretary of Defense, Donald Rumsfeld“Whenever possible we must seek to operate alongside alliance or coalition forces, integrating their capabilities and capitalizing on their strengths.”»U.S. National Security Strategy“Currently, there is no automated capability for passing command and control information and situational awareness information between nations except by liaison officer, fax, telephone, or loaning equipment.” »Undersecretary of Defense for Advanced TechnologyDCP-7CSE5095The Dynamic Coalition Problem (DCP)The Dynamic Coalition Problem (DCP)Dynamic Coalition ProblemDynamic Coalition Problem (DCP) is the Inherent (DCP) is the Inherent Security, Resource, and/or Information Sharing Security, Resource, and/or Information Sharing Risks that Occur as a Result of the Coalition Being Risks that Occur as a Result of the Coalition Being Formed QuicklyFormed QuicklyPrivate Organizations (PVO)Private Organizations (PVO)Doctors Without


View Full Document

UConn CSE 3000 - Information Sharing and Security

Download Information Sharing and Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Information Sharing and Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Information Sharing and Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?