Results 1 - 10
of
285
(DoD) Respiratory Disease Dashboard
"... Evaluate the user experience of a novel electronic disease report-ing and analysis system deployed across the DoD global laboratory surveillance network ..."
Abstract
- Add to MetaCart
Evaluate the user experience of a novel electronic disease report-ing and analysis system deployed across the DoD global laboratory surveillance network
Unifying the Secure DoD Network & Public ATM Network Infrastructure
"... The desire to transport classied trac securely utilizing the current network security paradigm has led the US department of defense (DoD) to maintain its own, isolated network, distinct from the public ATM network infrastructure. Internally, the DoD maintains four completely separate and isolated ne ..."
Abstract
- Add to MetaCart
The desire to transport classied trac securely utilizing the current network security paradigm has led the US department of defense (DoD) to maintain its own, isolated network, distinct from the public ATM network infrastructure. Internally, the DoD maintains four completely separate and isolated
Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD
"... Abstract. In this paper, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contest success function with the DOD metric would be used to evaluate the damage degree of network. The larger val ..."
Abstract
- Add to MetaCart
Abstract. In this paper, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contest success function with the DOD metric would be used to evaluate the damage degree of network. The larger
A Novel Characterization of Distributed Sensor Networks within the DoD
, 2012
"... Distributed sensor networks (DSN) within the DoD are motivated by a need for pervasive and persistent military surveillance, as addressed in Navy DoD guidance documents [1, 2, 3, 4, 5, 6, 7]. Previous studies [8, 9] have sought to characterize DSNs based on various attributes, taxonomies, and design ..."
Abstract
- Add to MetaCart
Distributed sensor networks (DSN) within the DoD are motivated by a need for pervasive and persistent military surveillance, as addressed in Navy DoD guidance documents [1, 2, 3, 4, 5, 6, 7]. Previous studies [8, 9] have sought to characterize DSNs based on various attributes, taxonomies
DoD Global Information Grid Mission Assurance
"... The DoD’s policy, planning, and warfighting capabilities are heavily dependent on the IT foundation provided by the GIG. However, the GIG was built for business efficiency instead of mission assurance against sophisticated adversaries who have demonstrated intent and proven their ability to use cybe ..."
Abstract
- Add to MetaCart
cyber as a tool for espionage and the criminal theft of data. GIG mission assurance works to ensure the DoD is able to accomplish its critical missions when networks, services, or information are unavailable, degraded, or distrusted. This article explores current threats to the GIG and outlines
Efficient Transmission of DoD PKI Certificates in Tactical Networks
"... Abstract—The DoD vision of real-time information sharing and net-centric services available to warfighters at the tactical edge is challenged by low-bandwidth and high-latency tactical network links. Secured tactical applications require transmission of digital certificates that contribute a major p ..."
Abstract
- Add to MetaCart
Abstract—The DoD vision of real-time information sharing and net-centric services available to warfighters at the tactical edge is challenged by low-bandwidth and high-latency tactical network links. Secured tactical applications require transmission of digital certificates that contribute a major
Poster Session: Efficient Transmission of DoD PKI Certificates in Tactical Networks
, 2012
"... Purpose: IDtrust is devoted to research and deployment experience related to making good security decisions based on identity information, especially when public key cryptography is used and the human elements of usability are considered. All software systems, from enterprise data centers to small b ..."
Abstract
- Add to MetaCart
Purpose: IDtrust is devoted to research and deployment experience related to making good security decisions based on identity information, especially when public key cryptography is used and the human elements of usability are considered. All software systems, from enterprise data centers to small businesses and consumer-facing applications, must make access control decisions for protected data. IDtrust is a venue for the discussion of the complete access control process (authentication, authorization, provisioning and security decision workflow), addressing questions such as: "What are the authorization strategies that will succeed in the next decade? " "What technologies exist to address complex requirements today? " "What research is academia and industry pursuing to solve the problems likely to show up in the next few years?" Agenda: Please visit the conference website for the complete program. See below
SRI International DoD INTERNET HOST TABLE SPECIFICATION
, 1982
"... The ARPANET Official Network Host Table, as outlined in RFC 608, no longer suits the needs of the DoD community, nor does it follow a format suitable for internetting. This paper specifies a new host table format applicable to both ARPANET and Internet needs. ..."
Abstract
- Add to MetaCart
The ARPANET Official Network Host Table, as outlined in RFC 608, no longer suits the needs of the DoD community, nor does it follow a format suitable for internetting. This paper specifies a new host table format applicable to both ARPANET and Internet needs.
Results 1 - 10
of
285