MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) 2018
DOI: 10.1109/milcom.2018.8599693
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multi-Domain Information Sharing in Tactical Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…This allows one domain's administrators to define rules locally that implement that domain's security and data sharing policies, without the need to coordinate with other domains' administrators. Sharing policies can be enforced using a security system based on Attribute-based Encryption (ABE), which permits to combine different security layers on a per-message basis [13] and ensures that only clients in possess of the right keys can access the messages. Federates can use ABE to encrypt the payload and metadata of messages before publication, but the information relative to the topic of publication will not be encrypted to guarantee correct routing.…”
Section: A Data Sharing Via Federation Servicesmentioning
confidence: 99%
“…This allows one domain's administrators to define rules locally that implement that domain's security and data sharing policies, without the need to coordinate with other domains' administrators. Sharing policies can be enforced using a security system based on Attribute-based Encryption (ABE), which permits to combine different security layers on a per-message basis [13] and ensures that only clients in possess of the right keys can access the messages. Federates can use ABE to encrypt the payload and metadata of messages before publication, but the information relative to the topic of publication will not be encrypted to guarantee correct routing.…”
Section: A Data Sharing Via Federation Servicesmentioning
confidence: 99%
“…Mechanisms are also available to limit the information being replicated, for example, based on geographical bounds. Finally, information exchange policies can also be enhanced to define different permission levels for each federate, i.e., information is shared only if the remote domain is entitled to receive that specific information [21].…”
Section: Margotmentioning
confidence: 99%