publication . Article . 2010

Security Shift in Future Network Architectures

Hartog, T.; Schotanus, H.A.; Verkoelen, C.A.A.;
Open Access English
  • Published: 01 Jan 2010
  • Publisher: NATO Science and Technology Organization
  • Country: Netherlands
Abstract
In current practice military communication infrastructures are deployed as stand-alone networked information systems. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements which current communication architectures cannot deliver. This paper informs IT architects, information architects and security specialists about the separation of network and information security, the consequences of this shift and our view on future communication infrastructures in deployed environments. The result of this paper is a proposal for a new architecture which addresses both security and flexibility requirements in deployed infrastructures as...
Subjects
free text keywords: Defence, Protected Core Networking, Trusted Operating Systems, Cryptography, Network Enabled Capabilities, Security, System High, Network Architecture, Communication Infrastructure, Information Security, Defence Research, Defence, Safety and Security, Communication & Information, ISEC - Information Security, TS - Technical Sciences
Related Organizations
Download from

B.J. te Paske, D. Boonstra, D.H. Hut, H.A. Schotanus, Information Labeling - Cross- Domain Solutions, Intercom Vereniging Officieren Verbindingsdienst, 38e jaargang, nr. 2, June 2009.

Martis, E.R., et al. Information Assurance : Trendanalyse, TNO report TNO-D&V 2006 B312, Oktober 2006.

Hallingstad, G., Oudkerk, S., Protected Core Networking - Initial concept description, March 2007.

Rushby, J., Design and Verification of Secure Systems, ACM Operating Systems Review, Vol. 15, No. 5, pp 12-21, http://www.csl.sri.com/papers/sosp81/sosp81.pdf, December 1981

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue