Standards Improve Military Technology Procurement
In the era of rapidly evolving threats that require much faster cycle times for fielding and modifying warfighting capabilities, standards enable vendors to focus more on advanced technologies while building on known, time proven standards. Military systems architected on open standards allow the military to benefit from the rapid pace of commercial technological innovation while maintaining exclusive advantages and security.
OMG has assisted government agencies and the military, like the DoD, Ministries of Defense and NATO in a number of standard initiatives. OMG worked with the US Navy and UK Ministry of Defence to create the Open Architecture Radar Interface Standard™ (OARIS™) and delivered the Information Exchange Framework (IEF) to support increased security and address cybersecurity concerns. OMG played a critical role in establishing the US DoD Software Communication Architecture (SCA) for Software Defined Radios (SDRs), known in OMG as the Software Defined Radio Profile™ (SDRP™). OMG also participated in the development of the US Department of Defense Architecture Framework™ (DoDAF™), UK Ministry of Defence Architecture Framework (MoDAF™), and NATO Architecture Framework (NAF™), now combined in the Unified Architecture Framework™ (UAF™).
Unified Architecture Framework® (UAF®)
The DoD Architecture Framework® (DoDAF®) which is also known as the Unified Profile for DoDAF and /MoDAF™ (UPDM™), Ministry of Defense AF™ (MoDAF™), the North Atlantic Treaty Organization (NATO) AF™ (NAF™), is now the Unified Architecture Framework® (UAF®) after being updated with new capabilities. The UAF is a generic, commercially orientated architecture framework based on the UPDM. UAF meets the specific business, operational and systems-of-systems integration needs of commercial and industrial enterprises as well as the U.S. Department of Defense, the UK Ministry of Defence, NATO, and other defense organizations.
Information Exchange Framework™ (IEF™)
Information Exchange Framework™ (IEF™) establishes a family of specifications for responsible information sharing and safeguarding (ISS) capabilities for: email exchange, file sharing, instant messaging (chat), structured messaging, and web services. IEF provides Simple View IEF Scope. The first in the envisioned family of IEF specifications has been published—the Information Exchange Packaging Policy Vocabulary™ (IEPPV™). This specification provides a policy vocabulary and UML® profile model for secure packaging and processing of structured information elements such as: National Information Exchange Model™ (NIEM™), Structured Threat Information eXpression (STIX™), Cyber Observable eXpression (CybOX™), and Trusted Automated eXchange of Indicator Information (TAXII™).
OMG Systems Modeling Language™ (SysML®)
Systems Modeling Language™ SysML® is a general-purpose graphical modeling language for specifying, analyzing, designing, and verifying complex systems that may include hardware, software, information, personnel, procedures, and facilities. SysML® supports the US Department of Defense’s Digital Engineer Modular Open Systems Approach (MOSA) initiative.
Common Object Requirements Broker Architecture™ (CORBA®)
CORBA® is an open, vendor-independent architecture and infrastructure standard that makes it possible for computer applications to work together over networks regardless of operating system, programming language and computing hardware. ATMs, cellphone networks and robots all run on CORBA.
Data Distribution Service™ (DDS™)
DDS™ is a middleware standard capable of handling very high-performance communications. DDS is used by both NASA and the US Air Force to distribute large amounts of data from multiple sources to multiple collection centers instantaneously, allowing them to make missile launch "Go Fly" or "No Fly" decisions within seconds.
Cyber threats facing a nation's critical infrastructure or mission-critical systems demand a cyber infrastructure that matches its scope and complexity. OMG Cybersecurity standards help protect software assets from unauthorized access and penetrations, outages, data corruption, and other operational problems.