KEYWORDS: Information security, Chemical elements, Databases, Computer security, Local area networks, Network security, Operating systems, Computer simulations, Warfare, Software development
It is said that information superiority is perhaps the greatest asset in war. In this era of both network and Coalition centric warfare, each aimed at establishing information dominance, technologies which support multi-domain operations are more critical than ever. This paper examines the components of multi-domain operations and presents two complementary methods, cross-domain information sharing and multi-domain windowing, to achieve its four major functions: dissemination, discovery & retrieval, collaboration, and resource management. Analysis of these method based solutions reveals the opportunity to devise a collection of services which align with DoD and industry migration towards service oriented architectures as well as more diversity in secure networking schemes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.