Securing Training Objects and Records Management

Award Information
Agency:
Department of Defense
Branch
Navy
Amount:
$749,982.00
Award Year:
2007
Program:
SBIR
Phase:
Phase II
Contract:
N61339-07-C-0036
Agency Tracking Number:
N052-113-0177
Solicitation Year:
n/a
Solicitation Topic Code:
n/a
Solicitation Number:
n/a
Small Business Information
TECHNOLOGY SERVICE CORP.
1900 S. Sepulveda Blvd, Suite 300, Los Angeles, CA, 90025
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
N
Duns:
053885604
Principal Investigator:
Geoffrey McKim
Senior Staff
(812) 245-8021
geoff.mckim@tsc.com
Business Contact:
James Allison
Contract Manager
(301) 565-2970
james.allison@tsc.com
Research Institution:
n/a
Abstract
In the training industry, widely dispersed training audiences (particularly for Web-based content) require various levels of access control to training materials. The use of smart cards, biometrics, and other tokens as security access/user identity verification keys provide an avenue not only to deliver the right distance learning applications to the right people, but also to provide a trusted audit trail for data modifications. Various Authentication Management Infrastructure (AMI) systems have emerged to help organizations manage the complexity associated with deploying complex, enterprise-wide authentication schemes involving identity tokens and biometrics. Within the training and development communities, the Learning Management System (LMS) has also emerged as an important product category. The LMS not only allows organizations to more effectively and efficiently manage the vast amount of metadata associated with training activities (learners, courses, transcripts, test results, certifications, skills, etc.), but also to provide a standardized run-time environment for launching and management of Web-based learning materials. The SCORM and Aviation Industry Computer Based Training Committee (AICC) standards have been developed to, among other things facilitate the integration of Web-based learning content from multiple providers into a single organizational LMS. There is, however, no standardized way to integrate the use of these strong authentication tokens (and the AMI products that provide this functionality) with the Learning Management System that launches and tracks training and learners. It is up to each LMS to provide its own ad hoc authentication infrastructure, leading both to unnecessary management complexity, and to under use of the security and traceability provided by Authentication Management Infrastructure systems. The purpose of this SBIR is to investigate and develop a standard framework and scripting language that would allow the enterprise AMI to be deployed efficiently in protecting and auditing training assets and records.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government