Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/2595
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWalt Scacchi
dc.contributor.authorThomas A. Alspaugh
dc.date.accessioned2020-03-16T18:18:36Z-
dc.date.available2020-03-16T18:18:36Z-
dc.date.issued2013-10-08
dc.identifier.citationPublished--Unlimited Distribution
dc.identifier.urihttps://dair.nps.edu/handle/123456789/2595-
dc.descriptionAcquisition Management / Defense Acquisition Community Contributor
dc.description.abstractThe goal of this research was continuing to investigate a new approach to address challenges in the acquisition of secure open architecture (OA) software systems for the Department of Defense (DoD; Department of Defense Open Systems Architecture [DoDOSA], 2011). Program managers, acquisition officers, and contract managers will increasingly be called on to review and approve security measures employed during the design, implementation, and deployment of OA systems. Our efforts sought to make this a simpler, more transparent, and more tractable process. Such a process must be easy to reuse, adapt, and streamline for different system application domains in order to realize cost reductions and improve acquisition workforce capabilities. Our research described in this report focuses on two problems for acquisition research: (1) how best to acquire secure OA software systems that include reusable software product line components (Mactall & Spruill, 2012; Womble, Schmidt, Arendt, & Fain, 2011); and (2) how to articulate and streamline a process for identifying and reviewing the security of OA software systems. Our overall research results presented in the following chapter stipulate that the best ways to streamline the process for acquiring secure OA systems in line with DoD's Better Buying Power 2.0 (What is Better Buying Power? 2013) guidelines are those that: (a) encourage the adoption of open (source) business models; (b) provide open source models of acquisition processes; and (c) employ techniques for streamlining acquisition processes for secure OA systems through direct measurement and assessment of acquisition processes, redesign and evolution of acquisition processes, design of new acquisition processes specific to secure OA systems, and through employment of cost management as an element in the design of future OA system acquisition processes.
dc.description.sponsorshipAcquisition Research Program
dc.languageEnglish (United States)
dc.publisherAcquisition Research Program
dc.relation.ispartofseriesOpen Architecture (OA)
dc.relation.ispartofseriesUCI-AM-13-115
dc.subjectSecure Open Architecture
dc.subjectSoftware Systems
dc.subjectCost Reductions
dc.subjectAcquisition Workforce
dc.titleStreamlining the Process of Acquiring Secure Open Architecture Software Systems
dc.typeTechnical Report
Appears in Collections:Sponsored Acquisition Research & Technical Reports

Files in This Item:
File SizeFormat 
UCI-AM-13-115.pdf5.93 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.