The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March-April (2013 vol.11)
pp: 24-33
Anita D'Amico , Secure Decisions, Division of Applied Visions, Inc.
Brianne O'Brien , Secure Decisions, Division of Applied Visions, Inc.
Mark Larkin , Secure Decisions, Division of Applied Visions, Inc.
ABSTRACT
Best practices for transitioning commercially funded research to operational environments don't always apply to government-funded cybersecurity endeavors due to constraints imposed by government regulations, certifications, and funding cycles. Most approaches for crossing this "valley of death" have been offered from the perspective of government sponsors and acquisition authorities. This article offers the perspective of an R&D team that has transitioned three cybersecurity situation awareness technologies from early research to installations in the US Department of Homeland Security and Department of Defense. The authors describe the techniques they used to build a bridge across the transition chasm.
INDEX TERMS
Government policies, Computer security, Computer crime, Software engineering, Research and development, Commercialization, Costs, visualization, user interfaces, testing strategies, maintenance planning, software acquisition, simulation, modeling
CITATION
Anita D'Amico, Brianne O'Brien, Mark Larkin, "Building a Bridge across the Transition Chasm", IEEE Security & Privacy, vol.11, no. 2, pp. 24-33, March-April 2013, doi:10.1109/MSP.2012.160
REFERENCES
1. W.D. Maughan, "Crossing the 'Valley of Death': Transitioning Research into Commercial Products—A Personal Perspective," Proc. IEEE Symp. Security and Privacy, IEEE CS, 2010, pp. 21–26.
2. "A Roadmap for Cybersecurity Research," Dept. Homeland Security, Nov. 2009, page B2; www.cyber.st.dhs.gov/docsDHS-Cybersecurity-Roadmap.pdf.
3. S.C. Paladino and J.E. Fingerman, "Cybersecurity Technology Transition: A Practical Approach," Conf. Homeland Security—Cybersecurity Applications & Technology (CATCH 09), IEEE, 2009, pp. 325–330.
4. Department of Homeland Security Science and Technology Readiness Level Calculator (version 1.1), Final Report and User's Manual, Homeland Security Inst., 30 Sept. 2009; www.homelandsecurity.org/docs/reportsDHS_ST_RL_Calculator_report20091020.pdf.
5. J. Dobbins, "Planning for Technology Transition," Defense AT&L, Mar.–Apr. 2004, pp. 14–17.
6. "Manager's Guide to Technology Transition in an Evolutionary Acquisition Environment Version 2.0," Dept. Defense, Defense Acquisition Univ., June 2005.
7. A. Gillespie et al., "Key Findings and Recommendations for Technology Transfer at the ITS JPO," publication no. FHWA-JPO-11-085, Nat'l Technical Information Service, 21 Mar. 2011; http://ntl.bts.gov/lib/42000/42100/42107 FHWA-JPO-11-085__Key_Findings___Recommendations_for_Tech_Transfer_at_ITS_JPO__PDF_508.pdf.
8. 2011 DHS S&T Cyber Security Research and Development Broad Agency Announcement 11-02, amendment 00014, Dept. Homeland Security, 30 June 2011; www.fbo.govindex?s=opportunity&mode=form&id=40161dd972cd60642ecaaa955e247067&tab=core&_cview=1.
9. "Reforming the Use of Common Criteria," National Information Assurance Partnership Common Criteria Evaluation Validation Scheme, 28 July 2012; www.niap-ccevs.org/evolution/announcements NIAP-CCEVS_Brochure_Pamphlet.pdf.
10. A. D'Amico and M. Larkin, "Methods of Visualizing Temporal Patterns in and Mission Impact of Computer Security Breaches," Proc. DARPA Information Survivability Conference and Exposition (DISCEX 01), IEEE CS, 2001, pp. 343–351.
11. A. D'Amico et al., "Visual Discovery in Computer Network Defense," IEEE Computer Graphics and Applications, vol. 27, no. 5, 2007, pp. 20–27.
12. K. Prole et al., "Wireless Cyber Assets Discovery Visualization," Proc. 5th Int'l Workshop Visualization for Computer Security (VizSec 08), Springer, 2008, pp. 135–143.
13. E. Forrester, "A Lifecycle Approach to Technology Transition," Software Engineering Institute, 1 Sept. 2003; www.sei.cmu.edu/library/abstracts/news-at-sei feature43q03.cfm.
14. "Introduction to Commerce Department Export Controls," US Dept. Commerce Bureau of Industry and Security, 5 May 2003; www.bis.doc.gov/licensingexportingbasics.htm.
15. B. O'Brien,A. D'Amico,, and M. Larkin, "Technology Transition of Network Defense Visual Analytics: Lessons Learned from Case Studies," IEEE Int'l Conf. Technologies for Homeland Security (HST 01), 2011, pp. 481–486.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool