The Role of Dynamic Security Policy in Military Scenarios

ABSTRACT

The military is moving towards Network Enabled Capability (NEC) where the emphasis is on resource sharing within national contingents and on a coalition basis, facilitated by the Network.  Future capability is predicated on the core attribute of agility.  NEC is expected to enable the dynamic formation of communities of interest and the rapid reorganisation of resources as required by military commanders.  Through the application of a suitable security policy framework to a small-scale case study, this paper tests the assertion that the ability to express, verify and implement flexible security policy is essential to achieve the agility required.


AUTHORS

Photo of Helge Janicke

Faculty of Computing Engineering and Media De Montfort University Leicester,
United Kingdom

Prof. Helge Janicke is the Technical Director of De Montfort University’s Cyber Technology Institute. He is the Head of School of Computer Science and Informatics. His interests are covering formal verification techniques and their application to CyberSecurity, SCADA, and Industrial Control System Security as well as aspects of Cyber Warfare. He established DMU’s Airbus Group Centre of Excellence in SCADA Cyber Security and Forensics Research in 2013. He is a general chair of the International Symposium on SCADA and Industrial Control Systems Cyber Security Research (ICS-CSR). He serves on the editorial board and as reviewer for a number of international journals.

General Dynamics UK, Newbridge, Communications Research Centre, Cardiff University, Cardiff
UK

Linda Finch is employed by General Dynamics United Kingdom Limited as a Security Research Engineer. She is currently pursuing her Ph.D, sponsored by the organisation, and is affiliated to Cardiff University. Her research interests lie in engineering ‘Fit for Purpose Security’ through the synthesis of security policy, control mechanism and architecture, where the security profile of a system may be dynamically modified in accordance with changes detected in the external environment.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com