Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/2595
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Walt Scacchi | |
dc.contributor.author | Thomas A. Alspaugh | |
dc.date.accessioned | 2020-03-16T18:18:36Z | - |
dc.date.available | 2020-03-16T18:18:36Z | - |
dc.date.issued | 2013-10-08 | |
dc.identifier.citation | Published--Unlimited Distribution | |
dc.identifier.uri | https://dair.nps.edu/handle/123456789/2595 | - |
dc.description | Acquisition Management / Defense Acquisition Community Contributor | |
dc.description.abstract | The goal of this research was continuing to investigate a new approach to address challenges in the acquisition of secure open architecture (OA) software systems for the Department of Defense (DoD; Department of Defense Open Systems Architecture [DoDOSA], 2011). Program managers, acquisition officers, and contract managers will increasingly be called on to review and approve security measures employed during the design, implementation, and deployment of OA systems. Our efforts sought to make this a simpler, more transparent, and more tractable process. Such a process must be easy to reuse, adapt, and streamline for different system application domains in order to realize cost reductions and improve acquisition workforce capabilities. Our research described in this report focuses on two problems for acquisition research: (1) how best to acquire secure OA software systems that include reusable software product line components (Mactall & Spruill, 2012; Womble, Schmidt, Arendt, & Fain, 2011); and (2) how to articulate and streamline a process for identifying and reviewing the security of OA software systems. Our overall research results presented in the following chapter stipulate that the best ways to streamline the process for acquiring secure OA systems in line with DoD's Better Buying Power 2.0 (What is Better Buying Power? 2013) guidelines are those that: (a) encourage the adoption of open (source) business models; (b) provide open source models of acquisition processes; and (c) employ techniques for streamlining acquisition processes for secure OA systems through direct measurement and assessment of acquisition processes, redesign and evolution of acquisition processes, design of new acquisition processes specific to secure OA systems, and through employment of cost management as an element in the design of future OA system acquisition processes. | |
dc.description.sponsorship | Acquisition Research Program | |
dc.language | English (United States) | |
dc.publisher | Acquisition Research Program | |
dc.relation.ispartofseries | Open Architecture (OA) | |
dc.relation.ispartofseries | UCI-AM-13-115 | |
dc.subject | Secure Open Architecture | |
dc.subject | Software Systems | |
dc.subject | Cost Reductions | |
dc.subject | Acquisition Workforce | |
dc.title | Streamlining the Process of Acquiring Secure Open Architecture Software Systems | |
dc.type | Technical Report | |
Appears in Collections: | Sponsored Acquisition Research & Technical Reports |
Files in This Item:
File | Size | Format | |
---|---|---|---|
UCI-AM-13-115.pdf | 5.93 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.