The Role of Dynamic Security Policy in Military Scenarios

ABSTRACT

The military is moving towards Network Enabled Capability (NEC) where the emphasis is on resource sharing within national contingents and on a coalition basis, facilitated by the Network.  Future capability is predicated on the core attribute of agility.  NEC is expected to enable the dynamic formation of communities of interest and the rapid reorganisation of resources as required by military commanders.  Through the application of a suitable security policy framework to a small-scale case study, this paper tests the assertion that the ability to express, verify and implement flexible security policy is essential to achieve the agility required.


AUTHORS

Software Technology Research Laboratory, De Montfort University, Leicester,
UK

Helge Janicke was awarded his Ph.D from De Montfort University where he explored compositional techniques for policy specification and refinement, in particular those used within the security domain. He is currently a Research Fellow at the Software Technology Research Laboratory at De Montfort University, where he is working on a MoD funded project investigating the application of dynamic policies for the management of trust in distributed, heterogeneous systems. His research interests are Compositionality, Policy Specification, Computer Security and Trust, Formal Methods and Software Engineering.

General Dynamics UK, Newbridge, Communications Research Centre, Cardiff University, Cardiff
UK

Linda Finch is employed by General Dynamics United Kingdom Limited as a Security Research Engineer. She is currently pursuing her Ph.D, sponsored by the organisation, and is affiliated to Cardiff University. Her research interests lie in engineering ‘Fit for Purpose Security’ through the synthesis of security policy, control mechanism and architecture, where the security profile of a system may be dynamically modified in accordance with changes detected in the external environment.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com