Technology and White Papers

BSTTech is constantly striving to perfect relevant solutions that will enhance the security or operations of our clients. Our focus is on the intelligent use of technology to solve complex business issues. Within the Government sector we have focused on the secure management of information through the development of cross domain security solutions that provide truly innovative information management for the 21st Century.

Using Commercial Of The Shelf (COTS) technologies from multiple vendors, BSTTech works to provide integrated and integratible solutions that meet a clients defined requirements. Whilst technology neutral and not commercially tied to any technology vendor, BSTTech does partner with selected technology providers to develop and enhance solutions that can be offered to our clients. Currently BSTTech partners with Oracle, CA, Hitachi Data Systems, IBM and Microsoft.

White Papers

Multi-Level Security

Enterprise Architecture

SOA

The holy grail of Computer Security.

Read more...

Business Enablement on steroids.

Read more...

Developing reusable services for business processes and capabilities.

Read more...

White Papers

 

Download Link

MLS In Defence

The following white paper discusses the journey of the various approaches to implementing MLS type technologies and describes a practical COTS based MLS implementation. This White Paper focus on Defence terminology and scenarios.

MLS Journey White Paper (Defence)

MLS In Government

The following white paper is a companion paper to the Defence paper above and discusses the journey of the various approaches to implementing MLS type technologies and describes a practical COTS based MLS implementation but focused on Government MLS issues, terminology and scenarios.

MLS Journey White Paper (Government)

Accelerated Accreditation Architecture

Coming Soon

Developing an Architecture for Accreditation of Systems

Policy Based Access Control

ABAC provides scope for a highly scalable access control regime, which can be applied beyond the traditional enterprise level, based on a defined trust-relationship among providers and consumers over and above the traditional system-to-system logon. ABAC seeks the provision and matching of specific attributes between users and information for each access. Examples of these attributes could include items such as citizenship, organisation, geographic location, association with law enforcement, etc which ABAC systems test against well defined policy requirements and enforce to determine access to data. This paper discusses the conceptual metadata requirements and business logic approaches necessary for the implementation of a Commercial of the Shelf (COTS) based ABAC authorisation approach to information security.

ABAC - Policy Based Acccess Control

SOA Enablement

BSTTech is working on compliance solutions that support the Network Centric Enterprise Services (NCES) capabilities espoused by the US Military. We have a white paper on this coming out soon.

How to implement SOA for Security

Further SOA Information

Please look at additional information on SOA by Oracle.

Oracle SOA Suite

Oracle Event Driven Architecture

Oracle Event Driven Architecture Primer


Cheap Web Hosting | Dedicated Hosting | Ecommerce Web Hosting