Automating Cloud Security Authorizations
This article describes the challenges and solutions for Security Authorization in a cloud based services environment. We describe Compliance as…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
This article describes the challenges and solutions for Security Authorization in a cloud based services environment. We describe Compliance as…
In 1961 at the MIT Centennial, John McCarthy opined “if computers of the kind I have advocated become the computers…
Most articles on cloud computing discuss security, policies, economies of scale, or other high level topics. For a more pragmatic…
Cloud computing and cloud services consistently place at the top of surveys ranking IT trends and CIO interests. This is…
Quantum Key Distribution (QKD) is an emerging cybersecurity technology which provides the means for two geographically separated parties to grow…
The potential that computer supported training solutions bring to the military training domain is fairly well recognized, yet we still…
Carriers no longer want their speciality pizzas delivered in a box, fully baked with pre-determined toppings. In fact they figure…
In the arena of modeling and simulation (M&S) data translation and integration is key to the success of every application….
Did you notice? Did you? … I hope you did. The name of our DACS publication has changed. Our new…
Civilization has always been heavily dependent on information. The fates of people of every nature and position have been determined,…
The Department of Defense (DoD) and Department of Homeland Security (DHS) need “justifiable evidence and high confidence that acquired systems…
This article describes the use of parametric modeling to support independent government cost estimates at the feasibility/budgeting, acquisition, and on-going…