Table 6: Data Sharing Tools - Examples
Tool / PurposeAccess Controls / Provides the mechanism to validate the rights or privileges (authorization) and claims of identity (authentication) for a user and matches those user credentials to defined access policies in order to make the grant or deny decision that is enforced through the policy enforcement point.
Adapter Services / Provides transformation or mediation of data assets and exchange formats. To be used for legacy system or data integration and federated domain transportation.
Cryptographic Binding / Creates a relationship between data objects and metadata tags by hashing the data object(s) and metadata and signing over the hashes with a signature using cryptography as a technique to ensure the integrity and authentication of data (i.e., no modifications, deletions or insertions by unauthorized sources).
Data Services Environment (DSE) / Provides an on-line repository enabling developers to reuse, understand, and share existing data assets. It addresses structural and semantic metadata such as schemas, web service description language, stylesheets, and taxonomies; descriptive metadata about proposed and approved ADSs, including their relationships and their responsible governance authorities; and descriptive, semantic, and structural metadata about services and other functional capabilities, including service definitions and specifications that can be discovered for subsequent use.
Data Tagging User Interface (UI) / Adds metadata tags to a data asset on the backend via a general Web UI, portal or local tagging tool. It is primarily used in a thin client or cloud environment.
DoD Information Technology (IT) Standards Registry (DISR) / The DISR is an online repository of IT standards. It defines the service areas, interfaces, standards (registry elements), and standards profiles applicable to all DoD systems. Use of the registry is mandated for the development and acquisition of new or modified fielded IT systems throughout the DoD.
DoD Storefront / Provides an access point for end-users to discover data assets.
Enterprise Authoritative Data Source (EADS) / Provides a registry of DoD data needs, data sources authoritative bodies (ABs) and AB-approved assertions on the context upon which a given data source is authoritative. EADS is part of the Data Services Environment (DSE).
Enterprise Catalog / Provides a repository for data providers to publish DDMS-compliant discovery metacards.
Enhanced Information Support Plan (EISP) / The Enhanced Information Support Plan (EISP) tool is used to fulfill the requirements for creating an ISP. For more information, see section 7.3.6 of this Guidebook.
Enterprise Messaging / Allows applications to publish and receive information such as special reports, alerts, briefs or section-specific information over specialized logical messaging channels.
Federated Search / Provides the ability to find information across multiple sources without guesswork to use as part of Content Discovery. No special expertise in a complex query language or interface is required.
Forge.mil / Enables the collaborative development and use of open source and DoD community source software.
Global Information Grid (GIG) Technical Guidance – Federation (GTG-F) / The GTG-F is a suite of software applications that provides technical guidance. The GTG-F content consists of and is based on GIG net-centric IT standards, associated profiles, engineering best practices and reference implementation specifications.
Metadata Registry (MDR) / Collects, stores, and disseminates structural and semantic metadata artifacts critical to successful development, operation and maintenance of existing and future DoD capabilities. MDR is part of the DSE.
Metadata Tagging Tools (e.g., AMTT) / Tools that extract information from data assets in order to generate metacards or documents with imbedded metadata.
Net-Centric Publisher (NCP) / Automatically publishes data assets to the Metadata Registry, Service Registry and Enterprise Catalog. NCP is part of the DSE.
Search Widgets and Applications / Leverages services for search and discovery of metadata cards and assets for various widgets and applications, primarily during the development and design phases.
Secure Data Tagging Tool (SDTT) Suite / NSA data tagging toolset. It includes reusable components that allow analysts and stakeholders to create metadata tags, validate them for conformance and reasonability to Controlled Access Program Coordination Office (CAPCO) or other standards, and perform cryptographic binding of the metadata to the data asset(s).
Security Mechanisms / Provides security implementations, configurations and protocols aimed at mitigating or stopping security threats throughout the enterprise. Includes mechanisms such as IdAM, XML Gateways, PKI, etc.
Service Discovery (SD) / Searches the Enterprise Service Registry for service providers and services. SD is part of the DSE.
Service Registry (SR) (Universal Description Discovery and Integration [UDDI]) / Provides the information required for an application developer to locate an appropriate service, determine the features and functions provided by that service, identify how to invoke the service, and determine where the service resides.
Smart Data / Tags all the data so users can track it, know the sensitivity, and apply access control values, provenance and smart routing.
Transport Protocols / Provide a standardized means for routing and transportation across a net-centric environment. Can be any of the technical protocols used for transportation and routing such as Hyper Text Protocol (HTTP), SOAP/HTTP, SOAP/Java Message Service (JMS), FTP, etc.
User Authentication and Authorization Services / Provides dynamic and account based access control to support the automated provision of web services and attribute-based access to data and resources using policy decision points and policy enforcement points. This is the foundation for access control throughout the Joint Information Environment (JIE).