Using HLA Object Models for the Analysis of Cross Domain Security Policies
ABSTRACT: Across defence, training equipment, data and scenarios are likely to have different classification levels. Thus it is sometimes necessary for training to be carried out using a federation of participating systemsrunning at different classification levels, but without compromising security rules. This is usually done using guards and filters to