WWN Software LLCData Sharing and Data Security - without Compromise |
|||
Home |
Need to Know Module |
Q/A |
White Papers |
National Security / Intelligence AnalysisA Scenario for Responsible Information Sharing with Sensitive, Private, or Classified Information Develops a solution set from today's information sharing problems and places the solution in the context of a scenario based on historical events. (13 pages) New IT Infrastructure to Strengthen Defense through Effective Intelligence Analysis Describes the approach giving equal weight to the roles of people and technology. Argues against so-called "Open-Source Spying". (6 pages) VideosDemonstration a walkthrough of a simple application to demonstrate the process and exercise the software libraries. Post Modern Data Security (20min) Contact
James Merino |
BankingBrokering Deals for Stock Swaps This on-line document describes our proof of concept software, which demonstrated how order preserving encryption an optional feature of the software libraries could be used in a financial application. The financial application in the demonstration was inspired by currency swaps. Reference DocumentsThe WWN Architecture for a Secure Information Sharing System Describes the Enterprise Architecture (38 pages) Additions to Prior Art An account of the inventions developed for the system recently and not included in WWN's patented intellectual property. Due to publication here and elsewhere, the new additions should be considered prior art under all patent-law action. Programming Interfaces Online (JavaDoc) documentation for the API. The Third Way - this is a partially-complete, draft textbook that provides a technically oriented overview of our software and its applications. It is designed to help a systems engineer integrate WWN software modules with a specific application. In addition, the book establishes a direction for the future. |