{"id":"https://openalex.org/W2042965813","doi":"https://doi.org/10.1109/milcom.2011.6127496","title":"Multi-security domain management integration architecture for end-to-end service management in military networks","display_name":"Multi-security domain management integration architecture for end-to-end service management in military networks","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W2042965813","doi":"https://doi.org/10.1109/milcom.2011.6127496","mag":"2042965813"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2011.6127496","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127496","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087922835","display_name":"Klaus-Dieter Tuchs","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Klaus-Dieter Tuchs","raw_affiliation_strings":["NATO Consultation, Command and Control Agency (NC3A), The Hague, Netherlands","NATO Consultation Command and Control Agency (NC3A), PO Box 174 2501CD The Hague, Netherlands"],"affiliations":[{"raw_affiliation_string":"NATO Consultation, Command and Control Agency (NC3A), The Hague, Netherlands","institution_ids":[]},{"raw_affiliation_string":"NATO Consultation Command and Control Agency (NC3A), PO Box 174 2501CD The Hague, Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026670858","display_name":"Tamas Halmai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tamas Halmai","raw_affiliation_strings":["NATO Consultation, Command and Control Agency (NC3A), The Hague, Netherlands","NATO Consultation Command and Control Agency (NC3A), PO Box 174 2501CD The Hague, Netherlands"],"affiliations":[{"raw_affiliation_string":"NATO Consultation, Command and Control Agency (NC3A), The Hague, Netherlands","institution_ids":[]},{"raw_affiliation_string":"NATO Consultation Command and Control Agency (NC3A), PO Box 174 2501CD The Hague, Netherlands","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050715078","display_name":"Marc van Selm","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marc van Selm","raw_affiliation_strings":["NATO Consultation, Command and Control Agency (NC3A), The Hague, Netherlands","NATO Consultation Command and Control Agency (NC3A), PO Box 174 2501CD The Hague, Netherlands"],"affiliations":[{"raw_affiliation_string":"NATO Consultation, Command and Control Agency (NC3A), The Hague, Netherlands","institution_ids":[]},{"raw_affiliation_string":"NATO Consultation Command and Control Agency (NC3A), PO Box 174 2501CD The Hague, Netherlands","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087922835"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7002,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71774284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1375","last_page":"1380"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14270","display_name":"Simulation and Modeling Applications","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6784713268280029},{"id":"https://openalex.org/keywords/network-management-application","display_name":"Network management application","score":0.636539101600647},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6055956482887268},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.6054234504699707},{"id":"https://openalex.org/keywords/structure-of-management-information","display_name":"Structure of Management Information","score":0.5611464381217957},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5334954857826233},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.5123401880264282},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49253663420677185},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.46256858110427856},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3129085898399353},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.3100646734237671},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2868976294994354},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09745639562606812}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6784713268280029},{"id":"https://openalex.org/C89094514","wikidata":"https://www.wikidata.org/wiki/Q7001060","display_name":"Network management application","level":4,"score":0.636539101600647},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6055956482887268},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.6054234504699707},{"id":"https://openalex.org/C187328666","wikidata":"https://www.wikidata.org/wiki/Q7625107","display_name":"Structure of Management Information","level":5,"score":0.5611464381217957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5334954857826233},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.5123401880264282},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49253663420677185},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.46256858110427856},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3129085898399353},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.3100646734237671},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2868976294994354},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09745639562606812},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2011.6127496","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127496","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1588763680","https://openalex.org/W2027057591","https://openalex.org/W2034776362","https://openalex.org/W2076620951","https://openalex.org/W2102785423","https://openalex.org/W4285719527","https://openalex.org/W6635019360"],"related_works":["https://openalex.org/W582999994","https://openalex.org/W2015940040","https://openalex.org/W2388899532","https://openalex.org/W2366515312","https://openalex.org/W2351459560","https://openalex.org/W771767546","https://openalex.org/W2393163015","https://openalex.org/W2351615100","https://openalex.org/W4210976393","https://openalex.org/W2156342121"],"abstract_inverted_index":{"Military":[0],"networks":[1],"are":[2,162],"partitioned":[3],"into":[4],"isolated":[5,159],"security":[6,26,34,76,150,192,217],"domains":[7,27,35,77,161],"in":[8,81],"order":[9],"to":[10,13,57,181,189],"be":[11],"able":[12],"handle":[14],"user":[15,47],"traffic/data":[16],"at":[17],"different":[18],"confidentiality":[19],"levels.":[20],"Depending":[21],"on":[22,201],"the":[23,46,52,59,82,86,158],"classification":[24],"of":[25,85,89],"information":[28,55,102,154,191],"exchange":[29,155],"between":[30,157],"low":[31],"and":[32,62,71,95,130,145,216],"high":[33,107,120],"is":[36,199],"extremely":[37],"restricted":[38],"or":[39],"even":[40],"prohibited.":[41],"This":[42,132],"holds":[43],"true":[44],"for":[45,113],"traffic":[48],"as":[49,51,93,208,210],"well":[50,209],"network":[53,72,115,146],"management":[54,73,90,97,116,139,147,153,160,171,178,196],"required":[56,99],"operate":[58],"corresponding":[60],"Information":[61],"Communication":[63],"Technology":[64],"(ICT)":[65],"domain.":[66],"Providing":[67],"centralized":[68],"end-to-end":[69,143],"service":[70,144],"across":[74,148],"all":[75,149],"was":[78],"not":[79],"possible":[80],"past":[83],"because":[84],"large":[87],"variety":[88],"protocols":[91],"in-use,":[92],"each":[94,114],"every":[96],"protocol":[98,117,124],"a":[100,135,175],"specific":[101],"release":[103],"technology":[104,112],"provided":[105],"by":[106],"assurance":[108],"guards.":[109],"The":[110,168,194],"guard":[111],"requires":[118],"very":[119],"development":[121],"effort":[122],"per":[123],"making":[125],"this":[126],"approach":[127],"prohibitive":[128],"cost":[129],"time-wise.":[131],"article":[133],"presents":[134],"\"Multi-Security":[136],"Domain":[137],"(MSD)":[138],"integration":[140,172,179,197,215],"architecture\"":[141],"enabling":[142],"domains.":[151],"Service":[152,211],"requirements":[156],"analyzed":[163],"through":[164],"representative":[165],"use":[166,184],"cases.":[167],"presented":[169],"MSD":[170],"architecture":[173,198],"introduces":[174],"novel":[176],"distributed":[177],"technique":[180],"support":[182],"those":[183],"cases":[185],"while":[186],"still":[187],"adhering":[188],"stringent":[190],"requirements.":[193],"proposed":[195],"based":[200],"Multi-Technology":[202],"Operations":[203],"System":[204],"Interface":[205],"(MTOSI)":[206],"standard":[207],"Oriented":[212],"Architecture":[213],"(SOA)":[214],"solutions.":[218]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
