Paper
18 May 2011 SMASHUP: secure mashup for defense transformation and net-centric systems
Mark D. Heileman, Gregory L. Heileman, Matthew P. Shaver, Mike Gilger, Pramod A. Jamkhedkar
Author Affiliations +
Abstract
The recent development of mashup technologies now enables users to easily collect, integrate, and display data from a vast array of different information sources available on the Internet. The ability to harness and leverage information in this manner provides a powerful means for discovering links between information, and greatly enhances decisionmaking capabilities. The availability of such services in DoD environments will provide tremendous advantages to the decision-makers engaged in analysis of critical situations, rapid-response, and long-term planning scenarios. However in the absence of mechanisms for managing the usage of resources, any mashup service in a DoD environment also opens up significant security vulnerabilities to insider threat and accidental leakage of confidential information, not to mention other security threats. In this paper we describe the development of a framework that will allow integration via mashups of content from various data sources in a secure manner. The framework is based on mathematical logic where addressable resources have formal usage terms applied to them, and these terms are used to specify and enforce usage policies over the resources. An advantage of this approach is it provides a formal means for securely managing the usage of resources that might exist within multilevel security environments.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Mark D. Heileman, Gregory L. Heileman, Matthew P. Shaver, Mike Gilger, and Pramod A. Jamkhedkar "SMASHUP: secure mashup for defense transformation and net-centric systems", Proc. SPIE 8062, Defense Transformation and Net-Centric Systems 2011, 806206 (18 May 2011); https://doi.org/10.1117/12.883486
Lens.org Logo
CITATIONS
Cited by 1 patent.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Computing systems

Information security

Logic

Ecosystems

Calculus

Defense and security

RELATED CONTENT

ASN reputation system model
Proceedings of SPIE (May 14 2015)
Models of information security trend analysis
Proceedings of SPIE (August 14 2002)
Need to know vs. need to share the net...
Proceedings of SPIE (April 29 2009)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top