您好,欢迎访问三七文档
274Vol.27No.420058InformationCommandControlSystem&SimulationTechnologyAug.20051672-7908(2005)04-0066-04210007TN911.2AInformationDisseminationManagementinGIGZHUMeng-ping,SONGZi-ling(PLAUniv.ofSci.&Tech.,Nanjing210007,China)Abstract:OnthebasisofpresentationoftheconceptsofGlobalInformationGrid(GIG)&InformationDisseminationManagement(IDM),andinviewoftheproblemswhichexistinIDM,especiallyinformationprocessioninthecourseofwarfare,combiningwiththerequestsoftherealizationofGIGforIDM,thispaperanalyzesindetailthefunctiontorealizeGIG,andespeciallydiscussesthekeytechnologyrelatedtorealizingGIG.Allofthesecansolvetheproblemabouthowtorealizethetransformfrominformationpredominancetooperationalpredominanceonthepreconditionofkeepingdecision-makingpredominancetosomeextent.Keywords:globalinformationgrid(GIG);informationdisseminationmanagement(IDM);informationprocession[12](GlobalInformationGrid,GIG)()()(InformationDisseminationManagement,IDM)GIG[2](FoAPS)2005-01-102005-03-141970-1950-[3]GIGC2(CommandandControl)[456]••467•••••GIG[34]••••GIG()GIG12[3]3[4]68GIG274GIG56[3][24]•[35]•[34]••[3]GIG[44696][5]C2[6]IDMGIG[1]CapstoneRequirementsDocument(CRD),GlobalInformationGrid(GIG)[DB].[2]GlobalInformationGrid(GIG)ArchitectureVersion1.0[R].[3]DepartmentofDefenseChiefInformationsOfficerGuidanceandPolicyMemorandumNo.4-8460,DepartmentofDefenseGlobalInformationGridNetworks.[4]CynthiaA.Glenister:InformationoperationintheIBCT,MilitaryReview[J]:May-June2002:60-62.[5]CARLaboratoryTestsTacticalImpactUsingInformationDissemination[J],Signal,June2000:23-25.[6]NetworkCentricWarfare,DepartmentOfDefenseReporttoCongress,27July2001.65[1]D.E.Denning.ALatticeModelofSecureInformationFlow[J].Comm.ACM,1976,vol.19(5):236-243.[2]C.E.Landwehr,C.L.Heitmeyer,J.Mclean.Asecuritymodelformilitarymessagesystems[J].ACMTransactionsonComputerSystems,1984,2(3):198~222.[3].[M].2003.p85-88.DA={(2,a),(3,c)}B={(2,a),(3,d)}C={(2,c)}D={(3,a)}E={(3,b),(2,c)}F={}Fu5d2d1u4u2u3u1ABCE
本文标题:GIG信息分发管理
链接地址:https://www.777doc.com/doc-4285785 .html