Tom Markham - Academia.edu (original) (raw)

Academia.edu uses cookies to personalize content, tailor ads and improve the user experience. By using our site, you agree to our collection of information through the use of cookies. To learn more, view our Privacy Policy

Address: Petoskey, Michigan, United States

less

Related Authors

Felix Garcia

Arosha Bandara

Tim Finin

Tim Finin

University of Maryland Baltimore County

Wolfgang Küchlin

Vitor Roque

Uploads

Papers by Tom Markham

Research paper thumbnail of Security Policy Automation-from Specification to Device Configuration

Abstract: To achieve the potential of network centric warfare the Army must securely share inform... more Abstract: To achieve the potential of network centric warfare the Army must securely share information across US operational units and with coalition partners while at the same time denying our enemies access to sensitive information. The sheer number of configuration parameters necessary to achieve such secure interoperability and optimal data sharing creates the opportunity for human error and slows the deployment process. Furthermore, the underlying security policies may be dynamic due to changing missions, changing coalition ...

Research paper thumbnail of Security Policy Automation-from Specification to Device Configuration

Abstract: To achieve the potential of network centric warfare the Army must securely share inform... more Abstract: To achieve the potential of network centric warfare the Army must securely share information across US operational units and with coalition partners while at the same time denying our enemies access to sensitive information. The sheer number of configuration parameters necessary to achieve such secure interoperability and optimal data sharing creates the opportunity for human error and slows the deployment process. Furthermore, the underlying security policies may be dynamic due to changing missions, changing coalition ...

Log In