2020 agenda


Systems Approach to Battlefield Digitisation

18 Nov 2020
Track 2
Common battlefield information architectures rely on federated and discrete network, compute and storage entities spanning from direct contact with the enemy right up to National command authority.  The flows of data and information span many interlinked and interacting systems and requires various degrees of Data at Rest/Data in Transit protection requirements. The use of cryptographic protection is a long established method, but a more holistic approach is needed in order to manage the complexity presented by this landscape.

This paper proposes some novel methods that may be used to simplify and manage the complexity of this problem.  It examines the use of data triage via AI/ML, cross-domain gateways, and adaptive and agile crypto management.