Download now Free registration required
Information providers on networks such as the Global Information Grid need to share sensitive information while still protecting that information from misuse. The authors show how common information-sharing mechanisms encourage and allow high-bandwidth, hard-to-detect information ex-filtration by malicious insiders, and by adversaries in the field. By leveraging net-centricity, modern stateless clients, and advances in distance visualization techniques, they can provide analysts and warfighters with highly-usable access to information that remains secured in high-availability, high-security data centers.
- Format: PDF
- Size: 1883.8 KB