Technology and White Papers
BSTTech is constantly striving to perfect relevant solutions that will enhance the security or operations of our clients. Our focus is on the intelligent use of technology to solve complex business issues. Within the Government sector we have focused on the secure management of information through the development of cross domain security solutions that provide truly innovative information management for the 21st Century.
Using Commercial Of The Shelf (COTS) technologies from multiple vendors, BSTTech works to provide integrated and integratible solutions that meet a clients defined requirements. Whilst technology neutral and not commercially tied to any technology vendor, BSTTech does partner with selected technology providers to develop and enhance solutions that can be offered to our clients. Currently BSTTech partners with Oracle, CA, Hitachi Data Systems, IBM and Microsoft.
White Papers
Multi-Level Security |
Enterprise Architecture |
SOA |
The holy grail of Computer Security. |
Business Enablement on steroids. |
Developing reusable services for business processes and capabilities. |
White Papers |
Download Link |
|
---|---|---|
MLS In DefenceThe following white paper discusses the journey of the various approaches to implementing MLS type technologies and describes a practical COTS based MLS implementation. This White Paper focus on Defence terminology and scenarios. |
MLS Journey White Paper (Defence) | |
MLS In GovernmentThe following white paper is a companion paper to the Defence paper above and discusses the journey of the various approaches to implementing MLS type technologies and describes a practical COTS based MLS implementation but focused on Government MLS issues, terminology and scenarios. |
MLS Journey White Paper (Government) | |
Accelerated Accreditation ArchitectureComing Soon |
Developing an Architecture for Accreditation of Systems | |
Policy Based Access ControlABAC provides scope for a highly scalable access control regime, which can be applied beyond the traditional enterprise level, based on a defined trust-relationship among providers and consumers over and above the traditional system-to-system logon. ABAC seeks the provision and matching of specific attributes between users and information for each access. Examples of these attributes could include items such as citizenship, organisation, geographic location, association with law enforcement, etc which ABAC systems test against well defined policy requirements and enforce to determine access to data. This paper discusses the conceptual metadata requirements and business logic approaches necessary for the implementation of a Commercial of the Shelf (COTS) based ABAC authorisation approach to information security. |
ABAC - Policy Based Acccess Control | |
SOA EnablementBSTTech is working on compliance solutions that support the Network Centric Enterprise Services (NCES) capabilities espoused by the US Military. We have a white paper on this coming out soon. |
How to implement SOA for Security |
Further SOA Information
Please look at additional information on SOA by Oracle.
Oracle SOA SuiteOracle Event Driven Architecture
Oracle Event Driven Architecture Primer