Promising Technologies For Future Systems
Promising Technologies For Future Systems
Promising Technologies For Future Systems
Future Systems
Grace A. Lewis
Edwin J. Morris
Lutz Wrage
December 2004
Technical Note
CMU/SEI-2004-TN-043
This work is sponsored by the U.S. Department of Defense.
The Software Engineering Institute is a federally funded research and development center sponsored by the U.S.
Department of Defense.
NO WARRANTY
Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder.
Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is
granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works.
External use. Requests for permission to reproduce this document or prepare derivative works of this document for external
and commercial use should be addressed to the SEI Licensing Agent.
This work was created in the performance of Federal Government Contract Number F19628-00-C-0003 with Carnegie
Mellon University for the operation of the Software Engineering Institute, a federally funded research and development
center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the
work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the
copyright license under the clause at 252.227-7013.
For information about purchasing paper copies of SEI reports, please visit the publications portion of our Web site
(http://www.sei.cmu.edu/publications/pubweb.html).
Contents
1 Introduction .................................................................................................. 1
2 DoD Programs.............................................................................................. 2
2.1 FORCEnet ............................................................................................ 2
2.2 Joint Battlespace Infosphere (JBI)......................................................... 3
3 Technologies ................................................................................................ 7
3.1 Open Grid Services Architecture (OGSA).............................................. 7
4 Research Projects...................................................................................... 12
4.1 Control of Agent Based Systems (CoABS) .......................................... 12
4.2 Integrated Security Services for Dynamic Coalition Management ....... 14
5 Conclusions ............................................................................................... 16
References......................................................................................................... 17
CMU/SEI-2004-TN-043 i
ii CMU/SEI-2004-TN-043
List of Figures
CMU/SEI-2004-TN-043 iii
iv CMU/SEI-2004-TN-043
List of Tables
CMU/SEI-2004-TN-043 v
vi CMU/SEI-2004-TN-043
Abstract
Joint Vision 2020, set forth by the Department of Defense, places a number of non-trivial,
challenging requirements on future systems: integration of data from distributed, dynamic,
heterogeneous sources on the fly, and networks robust and fast enough to support secure real-
time manipulation, fusion, and presentation of all this data. This technical note presents a few
of the many programs, technologies, and research efforts that are addressing the challenges
faced by future systems.
CMU/SEI-2004-TN-043 vii
viii CMU/SEI-2004-TN-043
1 Introduction
Joint Vision 2020, set forth by the Department of Defense, states that future military
operations will be increasingly conducted jointly, both with multiple branches of the U.S.
Armed Forces and with allied and coalition forces, requiring increased levels of
interoperability [ATO 04]. This vision places a number of non-trivial, challenging
requirements on future systems.
• Future systems will require the capability to rapidly integrate data from distributed,
heterogeneous, dynamic entities; present the relevant information in a form useful to
command decision makers; formulate an integrated response; and bring the appropriate
forces to bear.
• Future systems will require assembly on the fly, as dictated by evolving mission needs.
• A collaborative networking infrastructure that supports secure near-real-time
manipulation and sharing of massive amounts of increasingly complex information,
collected and fused from diverse sources, is required to facilitate ad-hoc teams.
This technical note presents of a few of the many programs, technologies, and research
efforts that are addressing the challenges faced by future systems. Section 2 presents
FORCEnet and Joint Battlespace Infosphere (JBI) as two Department of Defense (DoD)
programs that are facing the challenges of Joint Vision 2020. Section 3 presents the Open
Grid Services Architecture (OGSA) as a promising technology for building future systems.
Section 4 presents the results of two projects sponsored by the Defense Advanced Research
Projects Agency (DARPA), related to building secure systems on the fly.
CMU/SEI-2004-TN-043 1
2 DoD Programs
The vision being pursued by the U.S. Military to attain and exploit information superiority is
known as net-centric warfare (NCW). NCW links sensors, communications systems, and
weapons systems in an interconnected grid that allows for seamless information flow to
warfighters, policy makers, and support personnel [DoD 01]. Many Department of Defense
(DoD) programs are working on implementing capabilities to conduct NCW. FORCEnet and
JBI are two examples of these programs [Morris 04].
2.1 FORCEnet
Net-centric operations and warfare (NCOW) is the DoD operational concept for NCW,
linking platforms, computers, and people into a shared, state-of-the-art network (the Global
Information Grid or GIG—see Section 3 for a short description) that integrates dispersed
human decision makers, sensors, forces, and weapons into a highly adaptive, comprehensive
system to achieve unprecedented mission effectiveness.
FORCEnet is both a U.S. Navy concept of how NCOW will be achieved and the Navy’s
implementation of their portion of the GIG. It is intended to facilitate the integration of data,
command and control, and combat capabilities at sea, on land, in the air, and in space. It is
also intended to provide seamless integration and interoperation with joint, allied, and
coalition forces [NNWC 04].
The FORCEnet engineering effort is not a traditional program in that it is not an acquisition
effort and does not involve a prime contractor. Instead, it is an alignment effort directed at
identifying the appropriate requirements, architectures, standards, and protocols by which the
Navy can achieve the FORCEnet concept. In keeping with this strategy, the budget for
FORCEnet engineering is small, gradually increasing from 15.7M to 23M from FY05
through FY09.
In order to achieve the FORCEnet (and NCOW) vision, the Navy will first focus on systemic
network problems within the force, including
2 CMU/SEI-2004-TN-043
that provide increased and better managed bandwidth for the Navy’s portion of the GIG. The
effort will also define information architectures that incorporate data from many sources,
including unmanned sensors, making the resulting information available to tactical units.
Over the longer term, the FORCEnet engineering effort will develop the requirements,
architectures, standards, and protocols to enable
The FORCEnet organization is cognizant of the difficulties involved in reaching either the
shorter or longer term goals. The organization must build consensus on requirements and
architecture for the extremely complex and technically optimistic, but poorly understood
vision. It must encourage managers (who control most acquisition dollars) to potentially act
against the immediate interests of their programs and implement FORCEnet directives to
employ unfamiliar technologies and approaches. While embracing the necessary new
technologies, FORCEnet must be designed to interoperate with legacy systems, other military
services, and coalition forces.
CMU/SEI-2004-TN-043 3
The Joint Battlespace Infosphere1 (JBI) Research and Development (R&D) program directed
by Air Force Research Laboratory Information Directorate is addressing this problem by
defining a common information management environment that integrates data from many
sources. JBI will also manipulate that data to create actionable information and make it
available at the appropriate level to users [AFRL 03].
JBI is intended to both integrate data from the many stovepiped information systems that
currently support the forces, and to provide an architecture for future sensors, tools, and
planning aides. JBI will act as an intermediary between systems, converting information into
appropriate formats and fusing information to create a more complete situational picture.
The Web Ontology Language (OWL) builds on RDF and RDF Schema and adds vocabulary
for describing properties (e.g., symmetric, inverse of), classes (e.g., definition, subclass,
equivalence), and relationships (e.g., cardinality) [W3C 04]. OWL can be used to represent
ontologies—domain vocabularies that define the precise meanings of specific terms and
relationships between those terms. Unfortunately, OWL is immature, and presumes the
ability to develop shared ontologies. Building a shared ontology for the complex information
1
Infosphere means “the sum of all information available.”
4 CMU/SEI-2004-TN-043
contained in hundreds of independently developed legacy and new Air Force systems is a
daunting prospect.
Even if appropriate ontologies can be built, additional questions remain regarding how to
share information about how a service works and regarding the qualities of service (e.g.,
accuracy, reliability) provided. OWL-S is an extension of OWL and other technologies that
provides a means for sharing information about service invocation, enactment, composition,
monitoring, and recovery. In addition, OWL-S provides a mechanism for specifying the non-
functional properties of a service, such as security requirements and quality of service
[Martin 04]. A beta version of OWL-S that can serve as a basis for research and discussion of
semantic Web Services was released in mid-2004.
Beyond trying to find solutions to the key problem of conveying semantic content, JBI has
identified the need to create a fuselet. As we’ve noted, a fuselet is a special kind of client that
can refine or fuse information from one or more sources to create information in a form
required by users [Milligan 04]. Fuselets are intended for purposes such as transforming
information formats from one system into formats required by another system, and
combining information from multiple systems to supply a fused operational picture. Fuselets
will get their information from the JBI information space by subscribing to or querying
information objects, execute appropriate decision logic, and create new information objects.
In order to support “composable” combat forces and the anticipated fluid nature of military
activities, there must also be ways for military assets to efficiently “plug in” to JBI and
identify the capabilities and data the asset provides and requires. In order to provide this
capability, JBI has defined a force template. We’ve noted that a force template identifies
entities to (primarily) correspond to military units and support organizations [Marmelstein
02]. Entities are composed of other entities (e.g., smaller organizations or units) and clients
(e.g., specific systems, platforms, individuals). The infospheres that can be built up with
clients and entities (and the associated force templates) reflect the manner in which U.S. and
(potentially) coalition forces could be combined to achieve an operational goal. In addition
to providing information about what organizations can provide and require, the force
template can provide other critical information including
• quality of service
• time frame for service delivery
• security expectations
• accuracy of information
• ontologies
• fuselets
JBI can potentially serve as a gateway tying together the capabilities of the future U.S. Navy
FORCEnet with parallel U.S. Air Force C2 Constellation and U.S. Army Future Combat
Systems capabilities. In addition, JBI may serve to tie in other government (e.g., Homeland
Security) and non-government agencies, as well as the capabilities of coalition allies.
CMU/SEI-2004-TN-043 5
Related Programs
C2 Constellation
The C2 Constellation is an Air Force program established in 2000, designed to support NCW
and JV2020. The goal of this program is stated as
The Lead Systems Integrator (LSI) completed the initial Concept and Technology
Development (CTD) phase and transitioned to the System Development and Demonstration
(SDD) phase in 2003. The goal for FCS is to have the first unit equipped in 2008 and an
initial operational capability (IOC) in 2010.
6 CMU/SEI-2004-TN-043
3 Technologies
The majority of today’s military systems are stove-piped and static—they are conceived,
designed, constructed, and maintained to address a particular need or problem. However,
future military capabilities must be scalable and dynamic to meet a range of conflict types
and expectations placed on the military. One promising technology for developing and
assembling highly dynamic military capabilities that can be tailored to specific situations is
the Open Grid Services Architecture (OGSA).
OGSA defines the mechanisms for creating, managing, and exchanging information among
entities, called Grid Services. The Open Grid Services Infrastructure (OGSI) defines the
standard interfaces and behaviors of a Grid Service [GGF 03]. The Globus Toolkit is an open
source implementation of Version 1 of the OGSI Specification. Release 3.2 is available for
download from the Globus Alliance Web site [Globus 04, Sandholm 03].
As stated previously, OGSA represents everything as a Grid Service. Grid Services are
stateful transient Web service instances that are discovered and created dynamically to form
larger systems [Foster 02a]. Transience has significant implications for how services are
managed, named, discovered, and used—and transience is what makes a Grid Service
different from a Web Service. A Grid Service conforms to a set of conventions, expressed as
WSDL interfaces, extensions, and behaviors, for such purposes as
CMU/SEI-2004-TN-043 7
• lifetime management—mechanisms for reclaiming services and state in the case of failed
operations
• notification—mechanisms for asynchronously notifying changes in state
As OGSA evolves it will include interfaces for authorization, policy management,
concurrency control, and monitoring and management of potentially large sets of Grid
Service instances.
The current release of the Globus Toolkit, as presented in Figure 1Figure 1, contains the
following interface definitions:
All these services and primitives interact with the Grid Service Container—an abstract OGSI
run-time environment. Finally, the Web Service Engine and Grid Service Container are
hosted in a Hosting Environment, which implements traditional Web Server functionality
[Sandholm 03].
8 CMU/SEI-2004-TN-043
Figure 1: Globus Toolkit Architecture
This emerging technology is currently being used mainly in e-science and e-business
applications. However, there is great potential for its use in mission-critical systems, such as
in enabling collaborative targeting between multiple users and multiple sites. FORCEnet, for
example, will depend upon a distributed computing environment to support gridded sensors,
shooters, and decision makers. There is increasing support and research based on OGSA:
• extension of WSDL and UDDI to include QoS properties necessary for OGSA’s
objectives [Al-Ali 02, Sheth 02]
• OGSA interfaces for e-utilities—Web hosting, content distribution, applications, and
storage service providers who offer continuous, on-demand access [Foster 02b]
• Hewlett Packard’s Adaptive Enterprise strategy—synchronization between business and
information technology (IT) [HP 03]
• ICENI – Imperial College e-Science Networked Infrastructure—service-oriented Grid
middleware to support e-science [Furmento 02]
• Oracle 10g—Oracle supports OGSA and is integrating it into its 10g products
• IBM e-server and IBM total storage—two of the IBM products that support OGSA
• NSF Middleware Initiative (NMI)—distributes a pre-built Globus Toolkit with other
relevant components [NMI 04]
• the North Carolina BioGrid Project— established to research and implement new Grid
computing technologies that will enable researchers and educators throughout North
Carolina to take full advantage of the genomic revolution [NC 04]
Given its growing industry support and the validity of its conceptual foundation, there is a
good possibility that OGSA is a technology that will emerge as a standard for Grid
computing.
CMU/SEI-2004-TN-043 9
Related Efforts
There are many DoD efforts that are related to Grid computing, including several already
mentioned (e.g., FORCEnet, C2 Constellation). At the core of these efforts is the desire to
establish a Global Information Grid infrastructure to support NCOW. A brief discussion of
the Global Information Grid follows.
In short, the GIG is directed towards providing critical networking infrastructure to the
forces, essential for achieving NCW. The concepts and capabilities present in the GIG will be
the means to achieve what is called information superiority—a relative information
advantage vis-à-vis an adversary.
Both OGSA and the GIG are based on Grid computing, but they work at different levels. The
GIG works more at the infrastructure level, while OGSA works more at the middleware level.
That is, OGSA assumes an underlying infrastructure, while the GIG is an infrastructure in
itself with a number of added services, as illustrated in Figure 2Figure 2 [DoD 01].
10 CMU/SEI-2004-TN-043
Warrior and Other National Security Components
Information Management
Information Assurance
Information Distribution
UNCLASSIFIED
D
There is great potential for collaboration between OGSA and the organizations in charge of
implementing the GIG. For example, in a memorandum, "GIG Information Management”
dated August 24, 2000, there is guidance for “… discovery, retrieval, and management of the
flow of GIG information; implementation of mechanisms for access and delivery; processes
and methods to facilitate the proper understanding and use of information …” These could be
implemented as OGSA higher-level services. Another possibility is for the Globus Toolkit to
provide bindings so that OGSA Grid Services can be built on top of the GIG. There was an
interesting DARPA proposal to investigate the on-demand creation of systems through the
combination of core services and dynamically recruited services. These services would be
built on top of OGSA [NICCI 02]. This proposal was unfortunately not funded.
CMU/SEI-2004-TN-043 11
4 Research Projects
Many research projects are focusing on dynamically-built secure systems—one of the many
challenges for future systems. We will look at two DARPA-sponsored projects, Control of
Agent Based Systems (CoABS) and Integrated Security Services for Dynamic Coalition
Management.
The goal of the program was to develop and demonstrate techniques to safely control,
coordinate, and manage large systems of autonomous software agents. CoABS investigated
the use of agent technology to improve military command, control, communication, and
intelligence gathering based on the need to “rapidly assemble a set of disparate information
systems into a coherently interoperating whole” [Schmorrow 02].
Software agents are components that are capable of acting autonomously in order to
accomplish tasks on behalf of their users. The following characteristics of software agents
are of interest in the context of the CoABS program:
The CoABS program comprised three major tasks areas [Schmorrow 02].
1. Agent Grid—a task focused on the development of tools that form a basis for
upgrading military legacy systems to take advantage of agent technology. The Agent
Grid is a middleware-based approach, where agents connect to the Grid through
12 CMU/SEI-2004-TN-043
“Grid connectors.” Grid connectors can wrap legacy systems to enable those systems
to provide services to other systems connected to the Grid.
3. Scaling of Agent Control Strategies—the Agent Grid must be able to support a large
number of interacting agents. This task focuses on monitoring, coordination, control,
and management of agent collections. These strategies must be able to enforce
guaranteed behaviors even if the underlying network is unreliable.
Some of the results of the CoABS program are highlighted in [DARPA 03]. The program
• released CoABS Grid code and components tailored to military user needs
• demonstrated the scalability of the architecture to support more than 1,000 agents
without conflicts
CoABS is no longer an active DARPA program, but there are many programs that use or
have used concepts or technology developed in the CoABS program. The following table
summarizes these programs.
Program Organization
CMU/SEI-2004-TN-043 13
Integrated Flight Management/Advanced Information Directorate of the Air Force
Technology Demonstration (IDM/ATD) Research Lab (AFRL/IF)
In addition to the above mentioned programs the DARPA is funding the Collaborative
Cognition program which builds on CoABS.
The project developed a prototype of tools for coalition infrastructure services, which
includes joint policy administration services, certificate services, and group communication
services. The tools support the joining, voluntary departure, and involuntary departure of
coalition members. Accomplishments that are important to future systems include
14 CMU/SEI-2004-TN-043
The results of this work are critically important to support the dynamic coalitions’ sharing of
classified and unclassified information envisioned for NCW.
Related Efforts
Dynamic Coalitions
The Advanced Technology Office (ATO) in DARPA is the sponsor for the Dynamic
Coalitions program. Its mission is to develop technologies to support the secure creation of
dynamic coalitions, including the necessary technologies for policy management, group
communications, supporting security infrastructure services, data sharing, and joint
collaboration spaces. The work outlined by this program is mainly in the area of security, but
goes beyond the scope of the work outlined in the Integrated Security Services for Dynamic
Coalitions just described. Among other projects, it plans to investigate wireless networking
technologies to move security to the interface, develop cryptographic hardware accelerators
to speed up cryptographic computations, and develop a modular architecture and robust key
agreement within a dynamic coalition [ATO 04].
Information On-Demand
At a recent DARPA conference, program managers from DARPA's ATO outlined the need for
dynamic security and reliability to accompany the presence of a network; this is why it is
funding so many projects in this area [French 04a]. For example, DARPA recently awarded a
contract to Computer Systems Center Inc. (CSCI) for work on dynamic network security
applications. The project is called Information-on-Demand and is basically a study to
determine whether dynamic network security access is possible [French 04b].
The basis for CSCI’s work will be its product—Trusted Information Infrastructure (TII). TII
is designed to allow the secure transfer of information between secure networks at multiple
levels [CSCI 04].
CMU/SEI-2004-TN-043 15
5 Conclusions
This technical note discusses a small sample of promising work aimed at meeting the
challenges of future military systems. Meeting the challenges for future systems will not be
easy. To assemble systems on the fly, integrate data from distributed, heterogeneous and
dynamic sources, and support dynamic organization of combat capabilities is going to require
advances in networking, semantic description of data, and mechanisms to convey the quality
of service attributes (e.g., security, reliability, accuracy) of the entities providing the data.
Meeting these challenges will entail greater funding for basic research, as well as realistic
levels of expectations and support for military programs attempting to employ the fruits of
that research. Both are critical. The basic research should continue to develop and mature
mechanisms to assemble systems and convey meaning among them, while programs such as
FORCEnet will help clarify poorly understood requirements for dynamic, grid-oriented
systems, as well as verify the value of the technologies under development. If research can
be aligned with the programs and policies intended to promote and incentivize joint
operations, Joint Vision 2020 has a much greater chance of becoming reality.
16 CMU/SEI-2004-TN-043
References
[AFRL 03] Air Force Research Laboratory. Joint Battlespace Infosphere (JBI).
Rome Laboratory, N.Y: Air Force Research Laboratory, 2003.
http://www.rl.af.mil/programs/jbi/
[Al-Ali 02] Al-Ali, R.; Rana, O.; Walker, D.; Jha, S. & Sohail, S. “G-QoSM:
Grid Service Discovery Using QoS Properties.” Computing and
Informatics Journal, 21, 4 (2002): 363-82.
[Boeing 04] Boeing. Future Combat Systems. Chicago, IL: Boeing World
Headquarters, 2003.
http://www.boeing.com/defense-space/ic/fcs/bia/flash.html
[DARPA 03] DARPA. “Fiscal Year (FY) 2004/FY 2005 Biennial Budget
Estimates,” February 2003. Research, Development, Test and
Evaluation, Defense-Wide: Volume 1 - Defense Advanced Research
Projects Agency. Washington, DC: United States Department of
Defense, 2003. http://ec.sei.cmu.edu/keywords/new.htm.
http://www.darpa.mil/body/pdf
/FY04_FY05BiennialBudgetEstimatesFeb03.pdf
[Foster 02a] Foster, I.; Kesselman, C.; Nick, J. & Tuecke, S. “The Physiology of
the Grid: An Open Grid Services Architecture for Distributed
Systems Integration.” Open Grid Service Infrastructure WG, Global
CMU/SEI-2004-TN-043 17
Grid Forum, Lemont, IL, June 22, 2002. http://www.gridforum.org
/ogsi-wg/drafts/ogsa_draft2.9_2002-06-22.pdf
[Foster 02b] Foster, I.; Kesselman, C.; Nick, J. & Tuecke, S. “Grid Services for
Distributed System Integration.” IEEE Computer 35, 6 (June 2002):
37-46. http://www.globus.org/research/papers/ieee-cs-2.pdf
[Furmento 02] Furmento, N.; Mayer, A.; McGough, S.; Newhouse, S.; Field, T.; &
Darlington, J. “ICENI: Optimization of Component Applications
Within a Grid Environment.” Parallel Computing 28, 12 (Dec.
2002): 1753-1772.
[Globus 04] The Globus Alliance. Chicago, IL: University of Chicago, 2004.
http://www.globus.org/ogsa/
[HP 03] Hewlett-Packard. News Release: “HP Advances Grid Strategy for
the Adaptive Enterprise.” Palo Alto, CA: Hewlett-Packard, 2003.
http://www.hp.com/hpinfo/newsroom/press/2003/030904b.html
[Khurana 03] Khurana, H.; Gavrila, S; Bobba, R.; Koleva, R.; Sonalker A.; Dinu,
E.; Gligor, V. & Baras, J. “Integrated Security Services for Dynamic
Coalitions.” Proceedings of the DARPA Information Survivability
Conference and Exposition. April 22-24, 2003, Washington, DC.
Los Alamitos, CA: IEEE Computer Society, 2003.
18 CMU/SEI-2004-TN-043
[Marmelstein 02] Marmelstein, R. “Force Templates: A Blueprint for Coalition
Interaction within an Infosphere.” IEEE Intelligent Systems 17, 3,
(May-June 2002): 36-41.
[Martin 04] Martin, D.; Paolucci, M.; McIlraith, S.; Burstein, M.; McDermott,
D.; McGuinness, D.; Parsia, B.; Payne, T.; Sabou, M.; Solanki, M.;
Srinivasan, N.; and Sycara, K. “Bringing Semantics to Web
Services: The OWL-S Approach” Proceedings of the First
International Workshop on Semantic Web Services and Web Process
Composition (SWSWPC 2004), 2004 IEEE International
Conference on Web Services (ICWS'2004) July 6-9, 2004, San
Diego, CA. Los Alamitos, CA: IEEE Computer Society, 2004.
[Morris 04] Morris, E.; Levine, L.; Meyers, C.; Place, P.; & Plakosh, D. Systems
of Systems Interoperability. (CMU/SEI-2004-TR-004). Pittsburgh,
PA: Software Engineering Institute, Carnegie Mellon University,
2004. http://www.sei.cmu.edu/publications /documents/04.reports
/04tr004.html
[NC 04] North Carolina BioGrid Project. Research Triangle Park, NC:
MCNC Corporation, 2004. http://www.ncbiogrid.org/
[Sandholm 03] Sandholm, T. & Gawor, J. Globus Toolkit 3 Core – A Grid Service
Container Framework. Chicago, IL: Globus Toolkit Core White
Paper, 2003.
CMU/SEI-2004-TN-043 19
http://www-unix.globus.org/toolkit/3.0/ogsa/docs /gt3_core.pdf
[Sheth 02] Sheth, A.; Cardoso, J.; Miller, J.; Kochut, K.; & Kang, M. “QoS for
Service-oriented Middleware,” 528-34. Proceedings of 6th World
Multiconference on Systemics, Cybernetics and Informatics, July
14-18, 2002, Orlando, FL. Orlando, FL: International Institute of
Informatics and Systemics, 2002.
http://lsdis.cs.uga.edu/lib/download/SCM+02-SCI2002.pdf
[Sweet 04] Sweet, N. & Kanefsky, S. “The C2 Constellation: A U.S. Air Force
Network Centric Warfare Program - Network Centric Applications
and C4ISR Architecture.” Technology Symposium: The Power of
Information Age Concepts and Technologies. June 15-17, 2004, San
Diego, CA. Vienna, VA: Evidence Based Research, Inc., 2004.
http://www.dodccrp.org/events/2004/CCRTS_San_Diego/CD/paper
s/164.pdf
[W3C 04] W3C. OWL Web Ontology Language Guide. Cambridge, MA:
Massachusetts Institute of Technology, World Wide Web
Consortium, 2004: http://www.w3.org/TR/owl-guide/
20 CMU/SEI-2004-TN-043
Form Approved
REPORT DOCUMENTATION PAGE OMB No. 0704-0188
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching
existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding
this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters
Services, Directorate for information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of
Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503.
1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED
17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION OF 19. SECURITY CLASSIFICATION OF 20. LIMITATION OF ABSTRACT
OF REPORT THIS PAGE ABSTRACT
UL
Unclassified Unclassified Unclassified
NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-18 298-102