As the SBIR RFP requests, we plan to develop the concepts for innovative IA tools & techniques and study the feasibility that the tools/techniques will guarantee the authenticity, integrity and delivery of distributed data sources while maintaining the privacy (anonymity) of users and audit information (pseudonymity) per the Common Criteria within the GIG-NCES (Global Information Grid - Net-Centric Enterprise Services) framework. Our approach will be to study the feasibility of deploying a family of services that aid the Warfighter and other designated roles by tailoring the implementation of Information Assurance (IA) technology to proactively support and enhance their mission tasks. Without understanding the unique challenges faced by Warfighters in different contexts, IA can represent a costly burden by consuming his resources while leaving a trail for the enemy to use to decipher his mission intentions. Many times the Common Criteria (CC) has been viewed as a necessary evil that slows system development and adds cost, but clever planning can turn the CC into a real benefit by protecting the Warfighter in the conduct of his mission.
Keywords: Trusted Networks, Data Integrity, Reliability, Privacy, Anonymity, Prioritization, Modeling & Simulation, Trust Binding