The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2013 vol.28)
pp: 64-71
Niranjan Suri , Florida Institute for Human and Machine Cognition
Andrzej Uszok , Florida Institute for Human and Machine Cognition
Rita Lenzi , Florida Institute for Human and Machine Cognition
Maggie Breedy , Florida Institute for Human and Machine Cognition
Jeffrey M. Bradshaw , Florida Institute for Human and Machine Cognition
Yat Fu , US Air Force Research Laboratory
James Hanna , US Air Force Research Laboratory
Vaughn T. Combs , US Air Force Research Laboratory
Asher Sinclair , US Air Force Research Laboratory
Robert Grant , US Air Force Research Laboratory
ABSTRACT
To bring the advantages of network-centric warfare to coalition warfighting, we must significantly improve our ability to quickly share critical information while still satisfying security requirements. Here, the authors explore a services-based approach to such information management.
INDEX TERMS
Information management, Security, Military communication, Knowledge management, Service oriented architecture, Collaboration, Frequency modulation, service-oriented architectures, coalition information sharing, distributed applications
CITATION
Niranjan Suri, Andrzej Uszok, Rita Lenzi, Maggie Breedy, Jeffrey M. Bradshaw, Yat Fu, James Hanna, Vaughn T. Combs, Asher Sinclair, Robert Grant, "Extending Net-Centricity to Coalition Operations", IEEE Intelligent Systems, vol.28, no. 1, pp. 64-71, Jan.-Feb. 2013, doi:10.1109/MIS.2012.117
REFERENCES
1. M. Nooney, “Experiences of Combat Operations in Afghanistan,” Knowledge Systems for Coalition Operations (KSCO 09), invited keynote, 2009.
2. C. Gerber, “Dot-Connecting Across Domains,” Military Information Technology, vol. 14, no. 1, 2010, pp. 6–8.
3. T. Erl, Service-Oriented Architecture: Concepts, Technology, and Design, Prentice Hall, 2009.
4. M. Linderman et al., “A Reference Model for Information Management to Support Coalition Information Sharing Needs,” Proc. 10th Int'l Command and Control Research and Technology Symp., US Dept. of Defense, 2005; www.dodccrp .org/events/ 10th_ICCRTS/CD/ papers274.pdf.
5. N. Suri et al., “An Adaptive and Efficient Peer-to-Peer Service-Oriented Architecture for MANET Environments with Agile Computing,” Proc. 2nd IEEE Workshop Autonomic Computing and Network Management (ACNM 08), IEEE, 2008, pp. 364–371.
6. M. Carvalho et al., “A Cross-Layer Communications Framework for Tactical Environments,” Proc. 2006 IEEE Military Comm. Conf. (MILCOM 06), IEEE, 2006, pp. 1–7.
7. J.P. Loyal et al., “QoS Enabled Dis-semination of Managed Information Objects in a Publish-Subscribe-Query Information Broker,” Proc. SPIE Conf. Defense Transformation and Net-Centric Systems, SPIE, 2009; doi:10.1117/12.81 8744.
8. A. Uszok et al., “New Developments in Ontology-Based Policy Management: Increasing the Practicality and Comprehensiveness of KAoS,” Proc. IEEE Workshop on Policy 2008, IEEE, 2008, pp. 145–152.
9. J.M. Bradshaw et al., “How to Do with OWL What People Say You Can't,” 2008 IEEE Conf. Policy, invited keynote, 2008.
82 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool