Solving the Cross-Domain Conundrum

@inproceedings{Koelsch2013SolvingTC,
  title={Solving the Cross-Domain Conundrum},
  author={Bernard F Koelsch},
  year={2013}
}
Abstract : Commanders have operated in multiple security domains since the advent of national security classification structures and command and control systems. Planning, execution, and control in JIIM environments demands the movement of information between the security domains of all participants. Cross-domain solutions facilitate the necessary transfers, but only for systems designed to operate at multiple security levels or with multilevel security. Cross-domain solutions are also… 
1 Citations

Figures from this paper

DECA: DoD Enterprise Cloud Architecture Concept for Cloud-Based Cross Domain Solutions

TLDR
This research presents a conceptual design for a DoD enterprise cloud architecture that will save the DoD time and money in the certification process while also allowing efficient information sharing across multiple DoD Command and Control systems.

References

SHOWING 1-10 OF 42 REFERENCES

Lessons Learned From Developing the ABCS 6.4 Solution

Abstract : In response to Army decisions during the 1980s to develop increasingly lethal platforms aided by automation, several automated command and control (C2) systems were developed to support

Enabling information sharing through cross domain solutions: architecting the enterprise

TLDR
This paper investigates the requirements and architectures for the Enterprise Cross Domain Solutions and presents the current needs, technologies and gaps.

Lessons Learned from an afloat installation of an ashore command and control system

TLDR
The lessons learned from the installation of the Ocean Surveillance Information System (OSIS) Evolutionary Development (OED) on board the USS Blue Ridge (LCC-19) are documented and future installers recommendations to improve the planning of future afloat installations are provided.

Managing Sensitive Information: DOD Can More Effectively Reduce the Risk of Classification Errors

TLDR
A lack of oversight and inconsistent implementation of the Department of Defense's information security program are increasing the risk of misclassification, and GAO is recommending six actions, including several to increase program oversight and accountability.

Joint Task Force - Global Network Operations; The Supported Command

TLDR
The present Supported and Supporting relationship between the Joint Task Force-Global Network Operations and the other Combatant Commanders is analyzed from four different perspectives and recommendations to adjust the command and control architecture to better protect the Global Information Grid from the ever present electronic enemy are made.

Army Intelligence Consolidates Data

    Ackerman , and Maryann Lawlor , “ Creating an Information - Sharing Culture for Homeland Security

    • “ HQDA Command Directive for the Continued Ban of USB Flash Media on Army Networks , ” ALARACT 137 /
    • 2010

    Establishment of a Department of Defense (DOD)/Intelligence Community (IC) Unified Cross Domain Management Office (CDMO)," memorandum for DOD Components