Controlled information sharing in NATO operations

This paper identifies security requirements relevant to controlled information sharing scenarios during NATO coalition operations. We introduce a new approach to controlled information sharing, based on removal of security domains and extended use of content meta-data and release policies. This approach is applicable to the NATO Network Enabled Capability concept and captures requirements likely related to future NATO missions. Appropriate architectures and design options are also introduced.

[1]  Jonathan Jacky,et al.  The Way of Z: Practical Programming with Formal Methods , 1996 .

[2]  Jean-Raymond Abrial,et al.  Modeling in event-b - system and software engineering by Jean-Raymond Abrial , 2010, SOEN.

[3]  Cynthia E. Irvine,et al.  MYSEA: the monterey security architecture , 2009, STC '09.

[4]  Mike Maschino,et al.  Towards achieving cross domain information sharing in a SOA-enabled environment using MILS and MLS technologies , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[5]  J.G.R. Sathiaseelan,et al.  Multi-Level Secure Architecture for distributed integrated Web services , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[6]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.

[7]  Jacob C. N. Schuldt,et al.  Wildcarded Identity-Based Encryption , 2010, Journal of Cryptology.

[8]  Sander Oudkerk,et al.  Protected core networking: an architectural approach to secure and flexible communications , 2008, IEEE Communications Magazine.

[9]  Peter H. Feiler,et al.  Building Secure Systems using Model-Based Engineering and Architectural Models , 2008 .

[10]  Daniel Jackson,et al.  Software Abstractions - Logic, Language, and Analysis , 2006 .

[11]  Konrad Wrona,et al.  Designing medium assurance XML-labelling guards for NATO , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[12]  François Pessaux,et al.  Trusted Software within Focal , 2008 .

[13]  Cynthia E. Irvine,et al.  A cloud-oriented cross-domain security architecture , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.