STK in a Multi-Level Security Environment - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

STK in a Multi-Level Security Environment

Description:

STK in a Multi-Level Security Environment Nicholas Gavin Accenture Overview Objectives System Architecture Accenture Multiple Level Access Solution STK AMLAS ... – PowerPoint PPT presentation

Number of Views:166
Avg rating:3.0/5.0
Slides: 12
Provided by: KevinF156
Category:

less

Transcript and Presenter's Notes

Title: STK in a Multi-Level Security Environment


1
STK in a Multi-Level Security Environment
  • Nicholas Gavin
  • Accenture

2
Overview
  • Objectives
  • System Architecture
  • Accenture Multiple Level Access Solution
  • STK AMLAS Client
  • Questions
  • Contact Information

3
Objectives
  • Real-time and near-real-time data visualization
  • Manage data feeds with different clearance levels
  • Automated data scrubbers to pass data to low-side
  • MLS Analysis in STK
  • Create central MLS database for all analysis data
  • Perform STK analysis at lowest possible clearance
    level throughout project lifecycle
  • Minimize time required on high-level security
    assets
  • Minimize personnel clearance requirements

4
Architecture
5
AMLAS Overview
  • Allow applications to access data at multiple
    classification levels
  • Applications need not be multilevel aware
  • Application developers can focus on intended
    functionality without having to become experts in
    cross domain computing
  • Multiple data sources appear as a single
    multilevel database
  • No data stored within AMLAS itself, data
    providers retain control
  • Integrate legacy systems to provide cross domain
    data
  • SOAP wrapper provides web-service wrapper for
    existing applications
  • Immediate integration into SOA
  • Plug-in based architecture can use legacy
    applications as data sources to provide standard
    SQL and/or Web Services access
  • Cross domain certification can be limited to
    AMLAS and plug-ins
  • Legacy single level systems can continue to
    operate on isolated single level networks
  • Drastically simplifies certification and
    accreditation

Multi-Level Security Capability Achieved Using
Legacy Systems
6
AMLAS Capabilities
  • Reach up to higher level data sources to retrieve
    data at, and below, current request level
  • Reach down to lower level data sources to include
    results into high level requests
  • Combine multiple data sources at disparate
    security levels into a single data set
  • JDBC Recordset and/or IC ISM compliant XML return
    types
  • Programs
  • TENCAP Radiant Alloy
  • CEST/CREST/AMLST
  • Strong Angel

7
STK AMLAS Client
  • Seamless integration with STK
  • All functions accessible from STK Plug-in GUI
  • AMLAS client
  • Format AMLAS data requests
  • Save data to database
  • XML Import and Export
  • IC-ISM compliant XML for classification and
    control
  • Geography Markup Language (GML) specification
  • Sensor Markup Language (SensorML) specification
  • Conversion to STK Objects
  • Lightweight object capability for visualization
    of a large number of objects at one time
  • Heavyweight objects for analysis

8
Screenshot
9
Screenshot
10
  • Questions?

11
Contact Information
  • Nicholas Gavin
  • Accenture
  • 619-574-2335
  • nicholas.e.gavin_at_accenture.com
Write a Comment
User Comments (0)
About PowerShow.com