Title: Network-centric military system architecture assessment methodology

Authors: Osman Balci, William F. Ormsby

Addresses: Department of Computer Science, Virginia Polytechnic Institute and State University (Virginia Tech), Blacksburg, VA 24061, USA. ' Naval Surface Warfare Center, Dahlgren Division, Code W11, 17320 Dahlgren Road, Dahlgren, VA 22448, USA

Abstract: Recent paradigm shift from considering software as a product to treating software as a service has produced capabilities for engineering complex Network-Centric Military Systems (NCMSs). As the industry works on building a cyber-infrastructure and the Department of Defence moves towards network-centric operations and warfare, military systems are becoming increasingly more network-centric. Assessment of the architecture of such a NCMS is a very complex process, involves the measurement and evaluation of hundreds of qualitative and quantitative elements, mandates subject matter expert evaluation, and requires the integration of disparate evaluations obtained by experimentation, demonstration, trial, testing, direct measurement, analysis and examination. Planning and managing such measurements and evaluations require a unifying methodology and should not be performed in an ad hoc manner. This paper presents such a methodology named Military System Architecture Assessment Methodology (MSAAM). MSAAM advocates mission-oriented risk-driven architecture assessment based on four assessment perspectives: product, process, people and project. It enables the decomposition of architecture assessment into small pieces corresponding to leaf indicators and provides a structured framework for overcoming the complexity of architecture assessment.

Keywords: architecture assessment; assessment methodology; enterprise architecture; network-centric architecture; network-centric software; open architecture; software architecture; military systems; network-centric operations; warfare; NCMS; complex systems.

DOI: 10.1504/IJSSE.2008.018141

International Journal of System of Systems Engineering, 2008 Vol.1 No.1/2, pp.271 - 292

Published online: 02 May 2008 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article