About Us Our Work Employment News & Events
MITRE Remote Access for MITRE Staff and Partners Site Map
Our Work

Follow Us:

Visit MITRE on Facebook
Visit MITRE on Twitter
Visit MITRE on Linkedin
Visit MITRE on YouTube
View MITRE's RSS Feeds
View MITRE's Mobile Apps
Home > Our Work > Technical Papers >

Examining SOA Attribute-Based Security in Tactical Networks: A Web Services Security Engineering Initiative

May 2009

Ronald Albuquerque, The MITRE Corporation
Adam Jenkins, The MITRE Corporation

ABSTRACT

Emerging net-centric warfare technologies will provide military decision support personnel with access to significant amounts of battlefield information that is real-time. These technologies offer the potential to significantly transform command and control in Battle Management. Effective, intuitive information sharing will be a key driver for that improvement.

The war-fighter operates in dynamic situations where human factors impact the security environment. Systems employing enterprise Service Oriented Architecture (SOA) must implement advanced security that reflects this context.

Current approaches to information sharing are largely coarse-grained and do not take environmental factors into account—this posture discourages effective information sharing. Assured Information Sharing (AIS) attempts to strike a balance between protecting information and enabling the sharing of that information.

This technical report presents findings on research into Assured Information Sharing. It examines the best practices in implementing Attribute-Based Access Control (ABAC) via security policies in an SOA. In order to better inform SOA development, the focus is on operations within an airborne tactical network environment. It explores how fine-grained security mechanisms perform when disconnected, intermittent, and low-bandwidth network characteristics are imposed. The primary objective is to gain insight into associated tradeoffs.

The following are key conclusions drawn as a result of our research:

  • An Attribute-Based Access Control (ABAC) security capability can be provided with today's COTS technologies.
  • Fine-grained IA capabilities enable context-specific security.
  • Policy-Based Access Control (PBAC) results in a security capability that can enable closer alignment with operational realities.
  • ABAC is not prohibitively hindered by tactical network considerations.

View/Download Document Abstract Only

Additional Search Keywords

n/a

 

Page last updated: June 25, 2009   |   Top of page

Homeland Security Center Center for Enterprise Modernization Command, Control, Communications and Intelligence Center Center for Advanced Aviation System Development

 
 
 

Solutions That Make a Difference.®
Copyright © 1997-2013, The MITRE Corporation. All rights reserved.
MITRE is a registered trademark of The MITRE Corporation.
Material on this site may be copied and distributed with permission only.

IDG's Computerworld Names MITRE a "Best Place to Work in IT" for Eighth Straight Year The Boston Globe Ranks MITRE Number 6 Top Place to Work Fast Company Names MITRE One of the "World's 50 Most Innovative Companies"
 

Privacy Policy | Contact Us