Atlanta GA 18-19 September 2023



DETAILED AGENDA as of August 25, 2023






1200 1700 Early Registration Open Level 4





Exhibt Hall Hours

0700 1600

Registration Open

Level 4
0730 0900

Networking - Coffee, Tea & Light Breakfast 

Sponsored by    CMC Electronics
Level 4
0800 1200

Morning Breakout Sessions

Levels 3 & 4

DAU MOSA Cyber-Physical Workshop - Policy to Practice

Presented by: Dr. Robert Raygan

The DAU lead MOSA Cyber-Physical Workshop will deliver a fire hose of MOSA knowledge over the four-hour session and exercises. Initially developed for PEO-IEW&S to train their implementation guidance to cross-functional program teams (WSE027 MOSA Workshop), the MOSA Live all day version has brought cross-continuum awareness of MOSA not only to individual PEO's but cross-organizational System of Systems integration / interoperability partners as well. These guest presenters will share their organizational experiences of what is working and what could use some work following and implementing the statutory and regulatory MOSA requirements.

  • DAU MOSA Executive Overview and Workshop Introduction – Dr. Robert E. Raygan, DAU Professor of Engineering Management
  • Modula Open Systems Working Group (MOSWG) Updates – Monique "Mo" Ofori, CTR OSD OUSD R-E (SE&A)
  • Program MOSA Transformation Information Needs and Metrics Measuring MOSA Implementation and MOSA Product Value/Success – Mr. Steve Henry, NDIA MOSA Metrics Lead
  • Air Force Material Command (AFMC) Instruction 63-1201 Integrated Lifecycle Systems Engineering and Technical Management – Robert Bond, Plans and Programs Engineer, Systems Engineering Division (AFMC/ENS)
  • JSF-JPO MOSA Lessons Learned - Henry L. Nicholes, Jr., F-35 Mission Systems Open Architecture Lead
  • System-of-Systems Technology Integration Tool Chain for Heterogeneous Electronic Systems, known as STITCHES, and Missionware – Jimmy "Rev" Jones, PhD, NH-IV, SAF/AQLV, PEM, STITCHES Warfighter Application Team Lead
  • Panel Discussion Q&A and Next Steps

NOTE: This four-hour workshop will be cyber-physical meaning the workshop will be a DAU Web Event as well. Register for the event here. Participate during the conference here . both live and virtual attendees.


Technical Interchange Meeting (TIM) Presentations: Future Airborne Capability Environment™ Consortium (FACE)

The Open Group FACE™ Consortium Technical Interchange Meeting (TIM) Papers are peer reviewed technical papers addressing applications of the FACE Ecosystem. Some of the titles from past FACE TIM papers include: FACE™ Data Modeling for Software Developers, Using FACE™ Technical Standard to Address Interoperability Between Open Standards, Scaling Connections within the FACE™ Transport Services Segment, The FACE™ Approach Supports FVL, Harnessing the Richness of the FACE™ Technical Standard and Achieving Multicore Certification to DO-178C DAL A Using a FACE™ Operating System. A complete listing of the past TIM papers can be found at

To view the eight FACE Consortium TIM papers that will be presented, please click on title below


  • Chris Crook
  • Steve Fulmer
  • Joel Sherrill, Ph.D.
  • OAR Corporation

The Open Group Future Airborne Capability Environment™ Consortium (the FACE™ Consortium) Technical Standard defines the FACE Reference Architecture to promote reuse through portability across platforms. The Transport Services Segment (TSS) abstracts the logic and communication technologies of data exchange from a Unit of Portability (UoP), facilitating reuse in a broader range of integrated avionics systems.

Reusable, Reconfigurable Avionics Data Exchange (RRADE) includes a modular TSS solution per the FACE Technical Standard, Edition 3.1 [FACE3.1]. The allocation of TSS capabilities to the different kinds of TSS Units of Conformance (UoCs) comprising the modular TSS solution may be leveraged to facilitate reduced integration and qualification cost and schedule. RRADE is engineered to support potential qualification to DO-178C Design Assurance Level (DAL) Level C, with higher assurance levels possible through additional testing.

This paper describes the design decisions and refactoring employed to add support for the Aeronautical Radio, Incorporated (ARINC) 653 Safety Base Operating System (OS) Profile to RRADE to complement the existing support for the Portable Operating System Interface (POSIX) Safety Base OS Profile. Topics of interest to Software Suppliers include OS abstraction interfaces, C++03 Capability Set differences, and refactoring rationale. System Integrators who deploy and maintain the TSS solution within one or more FACE Computing Environments within an avionics system may be interested in the new Transport Protocol Modules (TPMs) for Application Executive (APEX) sampling and queueing ports.


  • Gary Gilliland Technical Marketing Manager, DDC-I

The Open Group Future Airborne Capability Environment™ Consortium (the FACE™ Consortium) has developed a Reference Architecture and Standard for real-time embedded avionics systems. The FACE Technical Standard defines required capabilities for real-time operating systems (RTOS), portable components, and data architecture to facilitate information exchange between components. The FACE Approach allows software-based "capabilities" to be developed as reusable components utilizing industry standard API's.

The Deos SafeMC™ multi-core operating system is designed to enable application software component portability, where binary (not just source code) reuse is the ultimate form of portability. This binary portability capability improves upon the objectives of the FACE Consortium, such that not only are applications portable but the DO-178 development artifacts for the avionics application are reusable across product lines within multi-core environments. Deos has achieved operating system segment (OSS) conformance to the FACE Technical Standard 3.1 Edition for Safety Base and Safety Extended profiles.


  • Ryan Paetzell, Pr. Systems Engineer, Collins Aerospace

This document discusses the successes and lessons learned from integrating the Mission Flight Management Software application (MFMS-1000) Portable Component Segment (PCS) Unit of Conformance (UoC) onto several platforms. Conforming the MFMS-1000 with edition 2.1.1 of the The Open Group Future Airborne Capability Environment™ Consortium (the FACE™ Consortium) Technical Standard has facilitated rapid deployment of the MFMS-1000 between disparate platforms despite limitations with the Portable Operating System Interface (POSIX) capabilities offered. Insights will be given in several areas related to integrating the MFMS-1000 into multiple platforms including:

  • Benefits of immediate testing
  • Common recompile changes identified
  • Challenges in deploying a combined Ada and C language PCS UoC
  • Board Support Package (BSP) limitations and integration workarounds
  • Challenges associated with Radio Technical Commission for Aeronautics (RTCA) DO-178C verification and certification

The material covered in this document provides a perspective on both the successes and challenges encountered from deploying the first FACE Certified Conformant Flight Management Software PCS UoC.


  • Christopher Noll, Sr Technical Fellow, Flight Control Systems and Software, Collins Aerospace
  • Harold Tiedeman Jr, Sr Technical Fellow, Avionics systems and FVL Chief Engineer, Collins Aerospace
  • Steven Avritch, Principal Technical Fellow, Flight Controls, Collins Aerospace

Leveraging a Modular Open Systems Approach (MOSA) on closed-loop fly-by-wire (FBW) flight control systems is a challenging task. Hardware size, weight, and power have traditionally been prioritized over open solutions. Hard real-time requirements associated with FBW systems have resulted in the use of very lightweight software stacks that are optimized for low-latency, deterministic performance, and simplicity of certification.

Today with available modern multicore processors and safety-critical Type 1 bare-metal hypervisors, it is now technically feasible to create MOSA solutions in the flight control domain.

This paper will discuss the origin of MOSA requirements for airborne weapon system computing environments, will describe the complexities associated with fly-by-wire flight control computing, and define optional multicore architectures. Among these architectures is a mixed MOSA concurrently supporting FBW applications and lower bandwidth capabilities, applying virtual machines (VMs) as a level of modularity.

The mixed modularity approach outlined in this paper is well aligned with the Open Group Vision of Boundaryless Information Flow™ (Ref [6]), in that the approach supports the free flow of information throughout the computing system while at the same time supporting the unique and differing real-time needs of flight control applications simultaneously with low-bandwidth general purpose applications.


  • Ehsan Salehi, Field Application Engineer, LDRA
  • Stephen Di Camillo, Technical Marketing and Business Development Manager, LDRA

Title 10 U.S.C. 2446a.(b), Sec 805 states all major defense acquisition programs are to be designed and developed using a Modular Open Systems Approach (MOSA). The goals of MOSA include reducing the cost and time to deploy new technology, improving the ability to deliver technical upgrades, and improving interoperability among systems. While not explicitly stated in MOSA guidance, there is an implicit requirement that MOSA aligned systems must be safe and secure. Considering the rapid pace of technological innovation and understanding that most of this innovation is realized through software, it's imperative that MOSA aligned standards for software development and verification support compliance with safety and security best practices.

The Future Airborne Capability Environment™ Technical Standard (FACE™ Technical Standard) is one of the foremost MOSA aligned standards designed to promote portability and create software product lines across the military aviation domain. This paper will present several ways the FACE Technical Standard and technical practices, together with complementary software security standards and best practices, support the development of secure software.


  • Richard Jaenicke
  • Green Hills Software

Advanced air combat training now relies heavily on digital technologies, with the ultimate goal of blending live, virtual, and constructive elements to provide the highest fidelity training. Some of the biggest challenges in advanced simulation and training include platform interoperability, timely upgrades to threat models, and the security of data and tactics used during training. A Modular Open System Approach (MOSA) can help with each of these.

  • MOSA's objectives of rapidly deploying new technology and enabling interoperability of systems and mission integration directly address training challenges of interoperability and timely updates through standard application programming interfaces (APIs) applied at appropriate modular layers.
  • Other standards such as the Common Criteria and Raise the Bar address security functionality and assurance, and can be used in combination with open API standards to field reusable components that meet common functional requirements.
  • The Tactical Combat Training System Increment II (TCTS II) program is a prime example of an air combat training system that employs both MOSA oriented API standards, including the FACE™ Technical Standard, and security functional and assurance standards, including Raise the Bar.


  • Shaun Foley, Skayl, LLC.

Transport Protocol Modules (TPMs) are optional components within the Transport Services Segment (TSS) that handle lower-level interactions with the "outside world". This powerful abstraction has many uses but understanding it is confusing since different use cases have different expectations and implications for both the TPMs and their users. This paper describes two primary use cases for TPM uses: interoperating with another Transport Service implementation and integrating external components that are not FACE™ Units of Conformance (UoC).

The main architectural role played by TPMs is to isolate the mechanics of using a particular protocol from the Transport Service (TS) as a whole. TPMs allow the TS to adapt to unknown future protocols and to interoperate with other Transport Services. However, if a TPM supports Serialization Injection and modularizes its own low-level data access, then it can be easily extended to incorporate data from new external components without needing to modify portable UoCs.

This architectural segregation has a big impact on how and more importantly 'when' integration occurs. A TPM abstracts the protocol and data payload of a connected device or system. It also separates when the semantics of the data payload can be defined. It isn't until devices are integrated that one actually understands the semantics of the data the TPM is passing to the TS. By data modeling the data at the TPM interface, at the time of integration, the integrator can utilize TPMs to connect to devices and assign the semantics of the structured data the TPM produces. This separation of concerns is a key enabler of MOSA.


  • Daniel Finnegan, Technical Solutions Manager - TTTech North America
  • Mirko Jakovljevic, Customer Solutions Architect – TTTech Auto AG
  • Wolfram Zischka, Aerospace Product Manager - TTTech Computertechnik A

MOSA in its current form does an excellent job identifying the modular software and hardware frameworks required to establish an open architecture for embedded systems. However, it does not cover physical aircraft integration methodology or other constituent elements essential for the design of robust embedded systems. Open Ethernet interfaces are core system integration technologies that must be integrated and configured with other software/hardware framework elements to enable real-time application hosting. However, the system modularity and scalability required for incremental upgradeability can be impaired if the design, configuration, & integration methodology do not prevent unintended cross-functional interferences among SW functions. The ability to incrementally modernize and upgrade the system can be further impaired if care is not taken to ensure that the open standards being used truly ensure the interoperability of all hardware and software within the system.

This paper outlines relevant system integration topics that could impair "Boundaryless Information Flow" in an otherwise MOSA-conformant system. It reflects on system integration decisions which may limit the ability of the Government, OEMs, or Tier 1s to fully meet MOSA's objectives.


Technical Interchange Meeting (TIM) Presentations: Sensor Open Systems Architecture™ (SOSA)

The Open Group SOSA™ Consortium Technical Interchange Meeting (TIM) Papers are peer reviewed technical papers addressing applications of the SOSA Ecosystem. Some of the titles from past SOSA TIM papers include: The SOSA™ EO/IR Mission Thread: Increasing Velocity through Standards Harmonization, Supporting Legacy & High-Speed Protocols with the SOSA™ Technical Standard Using COTS XMCs, Evolving Small Form Factor Architecture for the SOSA™ Technical Standard, and Transitioning to the SOSA™ / CMOSS Architecture. A complete listing of the past TIM papers can be found at

To view the four SOSA Consortium and four FACE Consortium TIM papers that will be presented, please click on titles below.


  • Chen Li, Technical Director, MQ-1C Ground Modernization, GA-ASI
  • David Brown, Associate Director, Avionics, Collins Aerospace
  • Jonathan Demildt, Associate Director, Avionics, Collins Aerospace
  • Mike Hubler, Co-Founder and Chief Experience Officer, Tektonux

Army Aviation and the FACE™ Consortium are at the forefront of defining ready and actionable technical standards to support Modular Open Systems Approach (MOSA) efforts. MOSA done right means more capability and faster fielding at scale to maintain capability overmatch. As such, vendors are incentivized to be forward looking and collaborate to showcase reuse, portability, and rapid integration. GA-ASI, Collins Aerospace, and Tektonux demonstrated the power of open systems through rapid integration of Gray Eagle 25M Advanced Teaming capability into a Future Vertical Lift (FVL) representative environment as part of an overarching open systems demonstration supported by other partners as well. By building on top of a robust toolchain, reuse of FACE™ Units of Portability (UoPs), and maintaining a user-centered design approach, the team members quickly updated and integrated disparate FACE Aligned software components into a demonstrable advanced teaming system. This demonstration of open systems integration at scale and across partner vendors presented unique challenges and lessons learned beneficial to product managers, technical leads, and platform integrators. Additionally, model-based systems engineering and adherence to FACE principles supercharges teaming and interoperability between different FACE platforms, enabling boundaryless information flow. Standardization and portability of models defining key public interfaces revolutionizes interoperable capability development, integration, and fielding.


  • Dave Walsh, Vice President, Parry Labs
  • Tony Adams, Solutions Architect, Parry Labs
  • Mark Brown, Associate Director, Collins Aerospace
  • Will Keegan, Chief Technology Officer, Lynx
  • Chip Downing, Senior Director, RTI
  • Scott Dennis, Chief Architect, U.S. Army Aviation & Missile Center
  • Glenn Carter, Branch Chief, U.S. Army Aviation & Missile Center
  • Alan Hammond, Steering Committee Chair, FACE™ Consortium

The US Army Aviation Enterprise is executing a transformation in how complex weapons systems are built collaboratively using a prescribed Modular Open System Approach (MOSA). To satisfy the Office of the Secretary Defense (OSD) guidance to use an Enterprise Architecture (EA), the Program Executive Office (PEO) Aviation is actively developing an Enterprise Architecture EA which provides common definitions, interfaces, and requirements for capability across the entire fleet of aircraft in the form of Major System Components (MSCs) and Modular System Interfaces (MSIs) contained within an Enterprise Product Architecture (EPA). The Program Executive Office (PEO) Aviation (AVN) Enterprise has identified an MSC titled, "Aviation Mission Computing Environment" (AMCE) and is developing its Component Specification Model (CSM). The AMCE CSM consists of configurable processing, Software Operating Environment (SOE), and software loading requirements. The PEO AVN Enterprise has determined that the resulting MSC developed by a supplier meeting the AMCE CSM shall "facilitate incremental deployment of capabilities".

This paper intends to draw attention to specific MOSA related benefits to be achieved in our industry. We propose definitions of software modules, operating system properties and key interface standards, with assumed use of the Future Airborne Capability Environment™ Technical Standard (FACE™ Technical Standard), for two distinct SOEs for the AMCE CSM: a mission system SOE, and a safety critical SOE.


  • Jonathan Craig Adams, AFLCMC, MDA/MBSE/DE Expert

The Department of Defense outlines its strategy for advancing Digital Engineering (DE) through a hand full of goals [D200]. Goal Five describes the necessity of transforming both culture and workforce – to address perhaps the greatest DE challenge the Air Force Lifecycle Management Center (AFLMC) undertook a pilot effort to model the SOSA™ Technical Standard Edition 1 [D201]. The pilot effort observes and suggests that transformation begins with understanding our current body of knowledge, current thinking and then applying innovative new practice(s) in order to realize DE goals. This paper describes how an innovative DE practice shifts thinking from communicating through requirements-based, document-based and/or current Model Based Systems Engineering (MBSE) approaches to an innovative approach, where architecture shapes requirements. Existing engineering practice most often approaches from requirements-based and document-based thinking, where requirements specify architecture. The innovative DE practice shifts thinking from communicating through requirements to communicating through architecture then requirements DE Goal One speaks of model formalization, integration and use. Another innovative practice, where architecture verifies and validates, focuses on The Open Group SOSA Sensor Reference Architecture (RA) model use, then its integration that builds upon architecture shaping requirements. Together, these two innovative practices, among others, ease integration from multiple vendors to meet the goals of nascent DE efforts within the DoD. The RA model integrates the Consortia Data Model, in order to type the structural model elements of the SOSA Sensor architecture that express its behavior and specifies its requirements. Integration and use of these models' better address the interoperability barriers to realizing continuous end-to-end representation of every SOSA Sensor acquisition across their lifecycle.


  • Benjamin Korzekwa, Moore Integrity Engineering
  • Brandon Meiners, Moore Integrity Engineering
  • Niraj Srivastava, Ph.D., Pacific Defense
  • Michael Scott Moore, Ph.D., Moore Integrity Engineering

"Primary goals of The Open Group Sensor Open System Architecture™ (SOSA) Consortium include significantly shortening the time to field new sensor capabilities and reducing development and integration costs. To achieve these goals, the SOSA Consortium is developing the SOSA Reference Architecture and Technical Standard, which defines modular elements with open interfaces for integrating hardware and software components from different sources. Except for the SOSA Data Model, which is based on the Future Airborne Capability Environment™ Data Model Architecture (FACE™ Data Model), the SOSA Consortium has thus far defined and managed the SOSA Reference Architecture and Technical Standard using office documents and tools. With a large Technical Standard like SOSA, this is cumbersome and difficult to manage. The SOSA Technical Standard is transitioning to Model-Based Systems Engineering (MBSE) techniques for defining and managing the Reference Architecture and Technical Standard, but this transition will take time. To improve efficiency in the interim and to provide a proof-of-concept example SOSA System Management Subcommittee (SMSC) members have worked together to develop an initial cut at an MBSE-enabled process, models, and tools to realize the process. This realization will be used by the SMSC In-Band System Management team for defining and managing the system management related interfaces to SOSA Sensor Components (modules and infrastructure elements) until the SOSA architecture modeling approach and supporting tools have been completed. It is provided to the SOSA community to be used or adapted as needed."


  • Arlissa Vaughn, CEO, Aegis Power Systems Inc.
  • Matt Van Steen, Senior Design Engineer, Aegis Power Systems Inc.
  • Mark Peastrel, Senior Design Engineer, Aegis Power Systems Inc.
  • Kyle Lamothe, Mechanical Engineer, Aegis Power Systems Inc.

Power supply module (PSM) testing backplanes are an efficient way to verify alignment with the Sensor Open System Architecture™ (SOSA) Technical Standard. The need for these tools increases as conformance requirements begin to emerge. In the pages that follow we will introduce the SOSA Technical Standard, its impact on PSMs, and focus on a commercially available testing backplane's ability to accelerate PSM integration. System developers, verification authorities, and component manufacturers leveraging the SOSA Technical Standard who seek to accelerate their integration timelines benefit from incorporating this tool into their process. Shortened development timelines, an agnostic vendor supply chain, automated in- process testing, and expedited mean-time-to-repair (MTTR) in the field are all benefits gained from the use of a backplane tailored to the SOSA Technical Standard. Because the tool assures a consistent data format, crucial PSM data from any vendor is made available to mission users for the life of the product.


  • Rafael J. García, Georgia Tech Research Institiute, ELSYS-AES, Open Systems Development Branch

The Open System Development Branch in the Electronic Systems Lab of Georgia Tech Research Institute (GTRI) has been working to produce a VITA 90 VNX+ Small Form Factor prototype in order to test the current progress of the standard and design methodology for Air Force Life Cycle Management Center (AFLCMC) and other government stakeholders. The prototype is built from an unfinalized version of VITA 90 and incorporates design suggestions from these stakeholders to drive design decisions. The main areas of investigation for this program are commercial-off-the-shelf (COTS) components integration, electrical design, mechanical/thermal considerations and front panel connectors. This document aims to inform stakeholders of the current integration hurdles and potential directions suggested to investigate or further develop in the standard


  • Patrick Rogers, AdaCore Inc.

This paper presents the use of static analysis as a means of automating the verification of source code conformance to FACE™ programming language capability sets. A specific static analysis technology for Ada is described. We then show how it can be used to automate the inspection activity, including especially those capability set restrictions that cannot be verified by a link-time test. The paper will be of interest to those concerned with conformance verification. Although the specific technology described is unique to Ada, the same principle of static analysis applies to the other programming languages supported by the FACE Technical Standard.

The material covered by this paper supports the OpenGroup vision of Boundaryless Information Flow™ by advancing the best practice for conformance verification.


  • Andre Odermatt, Principal Application Engineer, Real-Time Innovations (RTI

Redundancy is essential for ensuring safety, preventing catastrophic failures, and maintaining continuous operations. Mission-critical systems require high levels of redundancy to ensure operation in hostile environments or during emergencies. This paper explores redundancy of communication between different Portable Components Segment (PCS) and Platform-Specific Services Segment (PSSS) instances. Communication between the PCS and PSSS is handled by the Transport Services Segment (TSS). Redundancy is generally not formally addressed by the FACE™ Technical Standard. However, there are different ways redundancy can be achieved by choosing the right technology for the TSS – redundancy can then be handled by the integration software and the TSS, independent of the PCS and PSSS. Therefore, generic Units of Conformance (UoCs) can be used that do not need to be aware of redundancy and can handle messages from different sources.


Rotorcraft OEM Perspectives on MOSA

0830 - 1000   

Vertical Lift OEM Perspectives on MOSA

A quick overview of OMG management of a number of consortiums and how OMG's architectures, frameworks, models and standards impact defense communities around the world to include Ministries of Defense (MODs), the Department of Defense (DoD), NATO and their supporting agencies.

Moderated by: Dr. Bill Lewis, CEO, Tennessee Technical Test Team (T4)

  • John Bridges, Associate Technical Fellow, Bell
  • Kurt Kuhn, Associate Technical Fellow, Boeing
  • Kirk Avery, Senior Fellow, Sikorsky, a Lockheed Martin Co.

This session brings together experts on MOSA from the three major US military helicopter original equipment manufacturers (OEMs) to provide insights into developing the next generation of rotorcraft, including the progress and challenges in fully implementing the Army's ultimate vision of MOSA. Moderated by former Army Director of Aviation Development Directorate (ADD) Dr. Bill Lewis (SES, ret.), this session should be "required reading" for US Army attendees interested in or responsible for MOSA implementation.

1000 - 1030   

Coffee Break


0830 - 1000   

Open IMA: Bridging MOSA for Airworthiness Qualification

Moderated by: Mike Hirschberg, Director of Strategy, Vertical Flight Society (VFS)

  • Dr. Dan Schrage, Professor Emeritus, Georgia Tech

This session provides insights into the need for MOSA to use open integrated modular avionics (IMA) to bridge to a civil-military functional safety management (FSM) development assurance (DA) framework for certification, airworthiness and safety assessment for assured autonomy aircraft. This presentation is given by former US Army aviator Dan Schrage (SES, ret), who then became an aerospace engineer, manager and senior executive in Army Aviation development, and later a professor and director of vertical lift research at the Georgia Institute of Technology (Georgia Tech) in Atlanta.


OMG Architecture & Digital/Systems Engineering Support for MOSA Enabling Environments & Defense Standards

0800 - 0808    

OMG Introduction & MOSA EE Overview (Steve MacLaird – OMG SVP) (8 mins):

A quick overview of OMG management of a number of consortiums and how OMG's architectures, frameworks, models and standards impact defense communities around the world to include Ministries of Defense (MODs), the Department of Defense (DoD), NATO and their supporting agencies.

0808 - 0828

The MOSA Enabling Environment Working Group Overview (Lou Eyermann – SAIC Enterprise Architect / US Navy Systems Engineer) (20 mins):

The MOSA Enabling Environment Working Group Overview (Lou Eyermann – SAIC Enterprise Architect / US Navy Systems Engineer) (20 mins): Presentation addresses a MOSA Enabling Environment (EE): What it is; What it is not; and How it interrelates to the five MOSA Pillars. The five pillars of MOSA are: (1) An Enabling Environment (EE); (2) Employ Modular Design; (3) Designate Key Interfaces; (4) Select Open Standards; and (5) Certify Conformance.

The EE is the most Critical Pillar of MOSA or Foundation which MOSA Pillars stand on? How do OMG standards play the key and pivotal role in selecting Open Standards and improving MOSA interoperability and MOSA EE requirements and architecture? Join us to learn and ask questions about the MOSA Enabling Environment.

0828 - 0903

Digital Threads - Foundation for Digital Engineering (DE) and Modular Open Systems Approach (MOSA) (Dr. Manas Bajaj – Intercax Chief Systems Officer) (35 mins):

Digital Threads are the nervous system connecting data sources, consumers, and stakeholders for any cyberphysical system. Digital Threads make it possible to perform impact analyses, play what-if scenarios, trace and propagate information, and track project costs, risks, and schedule. The audience will learn about (1) building and scaling live digital threads to connect system requirements, hardware, software, verification, and other data sources, (2) querying and visualizing digital threads for impact analyses, (3) computing live metrics for program cost, risk, and schedule using digital threads connecting various disciplines, and (4) using a digital thread API for data science and AI, or building custom apps for program-specific use cases. The presentation will showcase the Syndeia digital thread plaMorm and OMG standards (SysML 1.x, SysML 2.0, Systems Modeling API and Services 1.0, UAF 1.x) in support of digital threads.

0903 - 0938

Jeff Goins (Adaptive Director) (35 mins):

This presentation introduces the Adaptive Modular Open Systems Integrator (MOSI) platform that is an implementation of a MOSA Enabling Environment (EE). Adaptive MOSI provides a robust semantic solution for organizing, analyzing, and integrating information by semantically capturing and managing the Acquisition and Program Management processes with the technical models and data capabilities needed within the DoD communities.

The Adaptive MOSI platform is built on an OMG MetaObject Facility (MOF) foundation that enables standard and custom metamodels to be easily added to the EE Platform without any software development. The briefing showcases one of many MOSI use case examples and the features of MOSI.

0938 - 1013

Enterprise Metacard Builder Resource (EMBR) – Rachael Orzechowski (Director, Modeling and Simulation Management Technologies – SimVentions) (35 mins):

The EMBR tool is a Government Off the Shelf (GOTS) tool that supports knowledge management and data exchange across organizational boundaries. Developed using open-source components, the tool facilitates the storage and exchange of multiple types of digital artifacts and is certified to protect government and intellectual property data. EMBR provides an authoritative data source by collecting data from multiple organizations in a common format, providing access control to data sources, and allowing access to digital artifacts created using multiple tool sets with one log in.

This brief explores the usage of the EMBR tool by multiple organizations to address the challenges they face in integrating and managing their models and simulations.

1013 - 1048

UAF 101 & Roadmap (Matthew Hause – System Strategy Inc. (SSI) Principal Consultant) (35 mins):

The Unified Architecture Framework (UAF) is an architecture framework that provides visualization for specific stakeholders concerns through engineering domains organized by various views. The UAF has evolved over the years to meet the needs of its users. Initially it implemented the views of DoDAF and MODAF using the Systems Modeling Language. It has since expanded to support human factors, security and cyber-security, motivational modeling using value streams, opportunities, drivers and challenges, Model-Based Acquisition (MBAcq) and Mission Engineering. With its traceability to SysML, it provides high level architecture with traceability down to systems engineering. This presentation will provide a view of where UAF has been and how it will continue to evolve to support enterprise architects.

1048 - 1123

MBAcq (Laura Hart – Research Engineer Sr. Manager at Lockheed Martin/ Steve MacLaird – OMG SVP) (35 mins):

Come explore how Model-based acquisition (MBAcq) provides the technical approach to acquisition that uses models and other digital artifacts as the primary means of information exchange, rather than document-based information exchange. MBAcq standardization minimizes acquisition risk while improving our communication. Customers are increasingly specifying MBSE in RFPs Customers are increasingly requiring models in proposals Lack of standardization raises proposal learning curves.

1123 - 1158

SysML V2.0 SysML V2 API (Dr. Manas Bajaj – Intercax Chief Systems Officer) (35 mins):

In July 2023 the Object Management Group (OMG) approved the Systems Modeling Language (SysML) version 2.0 beta specification. This included: the Kernel Modeling Language (KerML) 1.0 beta, Systems Modeling Language (SysML) 2.0 beta, and the Systems Modeling Application Programming Interface (API) and Services 1.0 beta. This presentation provides a user-focused overview of the SysML 2.0 language and the Systems Modeling API and Services 1.0 specifications. The audience will learn about the improved precision, expressiveness, consistency, usability, and extensibility in systems modeling enabled by SysML 2.0 over SysML 1.x. The Systems Modeling API and Services 1.0 specification provides a standard API for interacting with SysML 2.0 models and to integrate SysML 2.0 models with data and models in other disciplines in a digital engineering environment. The presentation showcases pilot implementations for these specifications and the finalization roadmap.

1158 - 1200

DoD SE (Nadine Geier – DoD Director, Systems Engineering):

Final Thoughts & The Road Ahead

0900 1200

Open Standard Overview: SOSA 101 & FACE 101

0900 - 1030    

Open Standard Overview: Sensor Open Systems Architecture™ 101 (SOSA 101)

Presenter: Nick Borton, SRC Incorporated, Machine Intelligence Architect

SOSA 101 provides an overview featuring: what SOSA is, key SOSA Methodologies, and central aspects of SOSA's Business and Technical Architecture. The top-level organization of the SOSA Consortium itself is also reviewed. Lastly, an implementer's practical view on how to utilize SOSA is provided.

1030 - 1200

Open Standard Overview: Future Airborne Capability Environment™ 101 (FACE 101)


  • Chips Downing, Real-Time Innovations (RTI) and FACE Consortium Business Working Group (BWG) Outreach Chair
  • Chris Edwards, US Army CCDC Aviation & Missile Center and FACE Consortium Technical Working Group (TWG) Chair
  • Gordon Hunt, Skayl, FACE Consortium Data Interoperability Working Group (DIOG) Chair

FACE 101 provides a high-level overview of the consortium, including the business, technical, and data aspects. It attempts to answer such questions as 'why the consortium exists', 'what problems are being solved', 'how adoption can support MOSA', and others. Attendees will be given an opportunity to ask questions.

0900 1200

Open Standard Overview: WOSA 101 & OMS 101

0900 - 1100    

Open Standard Overview: Weapons Open Systems Architecture (WOSA 101)

Weapons Open Systems Architecture (WOSA) AFRL/RW Developed Open Architecture for Munitions. Requirement on all new Weapons Programs within the Air Force. WOSA follows the objectives of MOSA to: 1) improve affordability through open competition, reuse, technology refresh, and economy of scale; 2) increase readiness by reducing fielding time, cyber resiliency, improving supply availability, and simplifying logistics; 3) enhance capability through technology refresh and planned insertion of improved capability; and 4) reduce schedule time by reducing re-engineering, obtaining fleet-wide improvements, and simplifying contracting procedures. Through the stand-up and use of the Munitions Open Architecture Test and Evaluation Laboratory (MOATEL) AFRL has achieved success in adoption of WOSA on 5 Air Force munitions programs. First look at some of AFRL Munitions Directorate first Digital Products and Techniques.

  • What is it, how we built WOSA and what makes WOSA different from other standards and standards bodies
  • Modularity Assessment and objective scoring – Modularity Scoring utilized as source selection discriminator to ensure program offices achieves their MOSA goals!
  • Lessons Learned and common pitfalls – Includes everything from verification challenges to program office contract language and ensuring data rights (Form, Fit, and Function)
1100 - 1200

Open Standard Overview: Open Mission Systems (OMS 101)

0800 1200


0800 - 0900     CMOSS Overview
0900 - 1000 MORA Overview
1000 - 1100 VICTORY Overview
1100 - 1200 PEO IEW&S MOSA approach and implementation
0800 1200

Contracts: OTA 101 with UTIC, AMTC, TREX-II, NAMC

0800 - 0900     UTIC
0900 - 1000 AMTC
1000 - 1100 TREX-II
1100 - 1200 NAMC
1030 1200

Quality Architectures from Quality Architects: Going Beyond "I Know Them When I See Them"

This panel of distinguished architects will explore what it takes to create high-quality architectures and the high-quality architects that create them. The discussion will address methods of creating and assessing architectures that are better than simply "fit for purpose," and will address what it takes to grow the next generation of quality architects (not just good "Cameo jockeys"). We will also address how quality architecting is crucial to successful MOSA outcomes.

Moderator: Dr. Steven A. Davidson, Chief Scientist for Systems Architecture, The MITRE Corporation

Panel Members:

  • Rolf Siegers, Technical Fellow, RTX Mission Architecture Program, Raytheon
  • Stephen Cohen, Chief Architect, Microsoft Global Engineering and Architecture
  • James Ivers, Principal Engineer, Software Architecture Lead, CMU SEI
  • Bob Scheurer, Systems Engineering / Technical Fellow, Boeing Defense, Space, & Security
  • Paul Preiss, CEO, Iasa Global
  • Grant Ecker, Co-Founder/Chair, Chief Architect Forum; VP, Chief Enterprise Architect at Danaher
0800 1200

MOSA in Acquisition: Policy to Practice Part 1 

The MOSA Policy to Practice technical track is dedicated to advancing the adoption and implementation of MOSA along with Model-Based approaches within defense acquisition.

This forum aims to foster a productive dialogue, facilitating the exchange of best practices, insights, and challenges associated with MOSA Implementation taking a Model-Based Acquisition (MBAcq) approach. It welcomes participation from academic, industry, and government stakeholders within the Department of Defense (DoD).

The primary challenge of this track is to define the MOSA requirements, documentation, and engineering processes necessary to prepare and assess a Model-Based Request for Proposal (RFP) package.

The track will take place on Monday, Sept 18th from 08:00 AM to 12:00 PM and resume on Tuesday, Sept 19th from 1:00 PM to 5:00 PM during the summit. Each session will commence with an introductory brief to set the stage, followed by featured talks on key challenge areas. During the latter half of each session, attendees will have an opportunity work though examples and provide potential feedback and solutions.

0800 - 0810     Welcome & Agenda
Nadine Geier, & Nathaniel Barley
0810 - 0840 Get the Most Out of MOSA:  Begin With the End in Mind
Dr. Steve Davidson
0840 - 9:10 Program MOSA Transformation
Information Needs and Metrics

Steve Henry
0910 - 0940 MBAcquisition Overview: Supporting Analysis and compliance with Doman Overlays (DOs)
Laura E. Hart
0940 - 1010 MOSA and Intellectual Property (IP): A Partnership to Protect, Integrate, and Contain
George Winborne
1010 - 1030 Break
1030 - 1050 Exercice 1: MOSA Technical Refresh Example - Acquiers Perspective
Steve Henry
1050 - 1055 Menti Poll & Results
1100 - 1140 Exercise 2:  A Systematic and Traceable MOSA Evaluation Process for System Architectures - Demo
Whit Matteson, GTRI
1130 - 1135 Menti Poll & Results
1140 - 1150 Session Summary and Preparation for Day 2
Ed Moshinsky & Laura Hart
1150 - 1200 End of Session Announcements
Nathaniel Barley
1200 Lunch
0800 1200

Advanced Manufacturing

0800 - 1000     Digital Engineering for Aerospace and Defense Applications
presented by Joel Quintana PhD, Director of Aeronautics and Defense, Aerospace Center at University of Texas at El Paso
1000 - 1100 Qualification and Portability of Digital Additive Manufacturing Processes
presented by Jeffrey Gaddes, Manufacturing Technology, DEVCOM Aviation & Missile Center
1100 - 1200 Modern Approaches for Implementing a Digital Twin
presented by Russ Waddell, Managing Director, Association for Manufacturing Technology
0800 1200

MOSA Industry Panels: Wind River, Booz Allen Hamilton, Collins Aerospace, JHNA

0800 - 0900     TBD (Wind River)
0900 - 1000 Cyber Security Modularity Panel (Booz Allen Hamilton)
1000 - 1100 Modular Airworthiness Qual Panel (Collins Aerospace)
1100 - 1200 MOSA Policy through Execution panel (JHNA)
0800 1215

MOSA Summit Innovation Prize Challenge (TechConnect)

Twenty-first century air mobility requires 21st century technology. Attend the Challenge and watch more than 20 innovators pitch next-generation communications, computing, and operations technology to an expert review panel of military, industry, and investment leadership. Winner will receive a crystal award and recognition as top innovator in the MOSA Innovation Challenge! TechConnect, in cooperation with the Vertical Lift Consortium and the nation's top MOSA funding organizations and leadership are proud to deliver this unique program for top solution providers to pitch their break-through innovations. Click here to view presenting innovators and expert review panelists.



Sponsored by    Milpowern
Level 3 & 4
1200 1300

Networking Lunch  

Sponsored by    Auterion
Expo Hall Exhibit Hall Open
1300 1330

Distinguished Opening Keynote

  • HON. Heidi Shyu, Under Secretary of Defense for Research and Engineering (OUSD(R&E))

Post Keynote Panel Discussion Moderator: Thomas Simms, Principal Deputy Executive Director for Systems Engineering & Architecture, DoD (OUSD(R&E))

1330 1400

PYRAMID - out-competing our adversaries through modular open systems collaboration

  • Cecil Buchanan, Chief Technical Officer, Royal Air Force
1400 1500

Senior Leadership Panel Discussion with Industry Experts

Panel Participants

  • John E. Whitley, Former Acting Secretary of the United States Army
  • Travis Slocomb, CEO Pacific Defense
  • Nick Lappos, Chairman Vertical Lift Consortium
  • Mark Spencer, Founder Avilution
1500 1530

Great Architectures Require Great Architects

  • Stephen Cohen, Chief Architect, Microsoft Global Engineering and Architecture, Microsoft
1530 1600

Directed Energy Weapon System (DEWS) Reference Architecture Efforts

  • Mr. Chris Behre, Principal Engineer for Directed Energy, OUSD (A&S)
1600 1700

Army Acquisition MOSA: Transforming to Acquire Like We Fight

Moderator: MG (ret) Bill Gayler

Panel Participants

  • COL Phillips, PEO Aviation
  • COL Jurand, PEO GCS
  • COL Nickolas Kioutas, Project Lead for PM Synthetic Environment (PM SE), PEO STRI
1700 1800

Networking Social in the Expo Hall  

Sponsored by    WNDRVR
Expo Hall





Exhibt Hall Hours

0700 1200

Registration Open  

Level 4
0730 9000

Networking - Coffee, Tea & Light Breakfast  

Sponsored by    Northrop Grumman
Level 4
0800 0845

ACWG All Hands Meeting

0900 1000

Distinguished Opening Keynote

  • HON. Nickolas H. Guertin, Director, Operational Test & Evaluation (DOT&E)

Mid-Morning Break  

Sponsored by    Atrenna
Level 4
1000 1100

IP/Data Rights Discussion

Moderator: Susan Ebner, Co-Chair, National Defense Industrial Association's Cyber Division's Cyber Legal Regulatory Policy Committee


  • Richard M. Gray, SES, Director of the Intellectual Property (IP) Cadre in the Office of the Under Secretary of Defense for Acquisition and Sustainment
  • Ms. Margaret Boatner, Deputy Assistant Secretary of the Army (Strategy and Acquisition Reform)
  • Jeff Showalter, Vice President of Operations, HII
  • John Esposito, Collins Aerospace
Auditorium Exhibit Hall Open
1000 - 1600
1100 1200

Tri-Services MOSA Priorities/ Datalink Panel Discussion

Panel Participants:

  • Christopher A. Garrett, Senior Leader, Air Force Life Cycle Management Center, Wright-Patterson, Panel Chair
  • Mark Mitcham, Sr. Advisor FVL Ecosystem, Army
  • Krunal Amin, SSTM, Tactical Data Links Naval Information Warfare Center – Pacific, Navy
  • Don Barrett, Program Executive Office - Command, Control, Communications and Battle Management (PEO-C3BM), Air Force
  • Mike DiMaria, Sr. Solution Architect, Leidos
  • Nick Cornelius, Senior Lead Engineer, BAH
1200 1300

Networking Lunch

Expo Hall
1300 1700

Afternoon Breakout Sessions

Levels 3 & 4
1300 1700

MOSA DAU - MOSA Workforce Development Track, Dr. Yvette Rodriguez, DAU MOSA Learning Manager

The DAU MOSA Workforce Development track emphasizes agile, strategic, and forward-thinking collaboration catering to the MOSA workforce requirements in defense acquisition.

This forum offers a chance to engage with pioneering MOSA leaders from academia, industry, and government. The aim is to progress towards cultivating a MOSA-proficient acquisition workforce for the Department of Defense.

Attendees will gain insights into present and upcoming strategies to educate and enhance the skills of the MOSA workforce.

1300 - 1315     Welcome & Day 1 Recap
Dr. Yvette Rodriguez & Dr. Robert Raygan
1315 - 1415 The Intersection of MOSA and Agile to Build Better Systems
Ms. Robin Yeman  & Dr. Suzette Johnson
1415 - 1425 Break
1425 - 1525 DAU MOSA Cyber-Physical Workshop Findings
Dr. Robert Raygan
1525 - 1535 Break
1535 - 1635 MOSA and Intellectual Property (IP) Considerations
Mr. Richard Gray & Mr. George Winborne
1635 - 1645 Break
1645 - 1700 Q&A and Feedback
1300 1400


1400 1500

Pratt Miller Core Lab

1500 1600

PM XM30 MOSA Requirement

1300 1400

Aviation: Architectural Alignments (FAF / EAF / UAF / EPA / CSM / Data Architecture)

1400 1600

Aviation: Communications, Datalinks, & Controls (CDC)

1300 1400

Aviation: Electrical Power Subsystem (EPS)

Tier 2 Army Aviation Modernization Priority, and MOSA MSC - will cover the EPS initiative to Modernize the Aircraft Electrical Systems to address increased loads and demands of emerging systems and technology insertions. We will discuss Priority, Requirements, Gaps and the strategy for the development of a MOSA compliant, system of systems approach for a Modernized Electrical Power System

1400 1600

Aviation: Aviation Mission Computing Environment (AMCE) CSM

1600 1645

Aviation: Domain Specific Data Model (Aviation specific)

Come participate in a discussion with Government and Industry panelists as they:

  • Communicate the value of DSDMs in acquisition
  • Share successes, lessons, and challenges
  • Identify opportunities for alignment, collaboration, and learning
1530 1630

Aviation: Digital Backbone

1500 1600

DE: Digital Engineering (focused on tooling, training, environment, workflows, CM, digital thread)

1300 1545

Directed Energy MOSA

1300 - 1415    

Government/Industry Panel Discussion: "Directed Energy Systems in a MOSA World"

Moderator: Dr. Steven A. Davidson, Chief Scientist for Systems Architecture, The MITRE Corporation

Panel Members:

  • Chris Behre, Principal Engineer for Directed Energy, OUSD (A&S)
  • Walt Roscello, Directed Energy SME, NAVSEA
  • David Lyman, Asst Vice President, Defense Management Division, Radiance Tech
  • Jeff Maloney, Program Manager - JDETO Support, ManTech International Corporation
  • Ray DelleFave, Directed Energy SME, Lockheed Martin
1415 - 1445  

Directed Energy Weapon System (DEWS) Modular Open Systems Approach Reference Architecture (DEWS MOSA RA)

Presented by Keegan Merkert, Lead Systems Engineer, The MITRE Corporation

1445 - 1515   

Directed Energy Weapon Systems (DEWS) MOSA Reference Architecture (RA) – Sensor Open System Architecture (SOSA) Integration – Greater than the Sum of the Parts

Presented by Ron Kacsmar, Systems Engineer, The MITRE Corporation

1515 - 1545   

DEWS MOSA RA Digital Model: A DE [Digital Engineering] Exemplar for DE [Directed Energy]

Presented by Al Galgano, Systems Architect, The MITRE Corporation

1300 1700

WOSA Industry Engagement

  • Opportunity for WOSA to engage with industry on questions to get involved in the working groups
  • AFRL Munitions Directorate needs industry collaboration on new research activities for Digital Engineering (Model of Models, etc)
  • Discussions on future MOATEL 3rd party verification how does industry accomplish this independent of government programs"
1300 1700


1300 1700

MOSA in Acquisition: Policy to Practice Part 2

The MOSA Policy to Practice technical track is dedicated to advancing the adoption and implementation of MOSA along with Model-Based approaches within defense acquisition.

This forum aims to foster a productive dialogue, facilitating the exchange of best practices, insights, and challenges associated with MOSA Implementation taking a Model-Based Acquisition (MBAcq) approach. It welcomes participation from academic, industry, and government stakeholders within the Department of Defense (DoD).

The primary challenge of this track is to define the MOSA requirements, documentation, and engineering processes necessary to prepare and assess a Model-Based Request for Proposal (RFP) package.

The track will take place on Monday, Sept 18th from 08:00 AM to 12:00 PM and resume on Tuesday, Sept 19th from 1:00 PM to 5:00 PM during the summit. Each session will commence with an introductory brief to set the stage, followed by featured talks on key challenge areas. During the latter half of each session, attendees will have an opportunity work though examples and provide potential feedback and solutions.

0110 - 0120     Welcome & Agenda
Nadine Geier & Nathaniel Barley
0120 - 0130 Recap of Day 1
Ed Moshinsky
0130 - 0200 MOSA and Intellectual Property (IP): Data Rights and Architectures, Planning and Implementation
George Winborne
0200 - 0230 MBAcquisition: Using Architecture, Patterns, & Model Curation
Laura E. Hart
0230 - 0300 Assured Armaments Ref Arch (AARA): Modular Logical architecture specifications for interchangeable weapon components
Michael Brattoli, Army
0300 - 0310 Menti Poll & Results
0310 - 0330 Break
0330 - 0350 Architecture Assessment via AVIaN: How to assess an architecture against a domain concern
Richard Wise/GTRI
0350 - 0415 Exercise 1: AVIaN demo for standards adherence
Richard Wise/GTRI
0410 - 0415 Menti Poll and feedback
0420 - 0445 Exercise 2: Presenter Q&A panel
0440 - 0445 Menti Poll & Results
0450 - 0455 Session Summary
Ed Moshinsky & Laura E. Hart
0455 - 0500 Close Session
Nathaniel Barley
1300 1500

Advanced Manufacturing

1300 - 1400     Additive Manufacturing Ready for Production
presented by John Wilcynski, Executive Director, America Makes
1400 - 1500
Implementing MOSA: Supply Chain Risk Management in Open Architectures for Hardware and Software
presented by Ben Denton PhD, Specialist Leader, Cyber Security at Deloitte
1430 1700

FACE/SOSA Planning Meeting

1430 -1525    

Contracting for MOSA Using an Open Systems Management Plan (OSMP)

Summary: Over the last several years, the importance of Modular Open Systems Approach (MOSA) in acquisitions has increased, as reflected in the DoD policies and guidance that have flowed down through the services with the emergence of an Open Systems Management Plan (OSMP) as a key deliverable and program management tool. For example, the Assistant Secretary of the Army – Acquisition, Logistics and Technology (ASA(ALT)) MOSA Implementation Guide v2.0 from January 2022 states, "To ensure the vendor is appropriately applying MOSA throughout the program, the PM for a major system should require delivery of an Open Systems Management Plan (OSMP)." This presentation focuses on how the recently published FACE Contract Guide v3.1 details effective use of an OSMP as a critical deliverable and program management tool within a MOSA.

1530 - 1655

Technical Interchange Meeting (TIM) Presentations: Future Airborne Capability Environment™ Consortium (FACE)

The Open Group FACE™ Consortia Technical Interchange Meeting (TIM) Papers are peer reviewed technical papers addressing applications of the FACE Ecosystem.

To view the three FACE Consortium TIM papers that will be presented, please click here.


  • Geoffrey Sizemore / Torch
  • Dr. Justin Pearson, CISSP, CEH, SEC+ / UAH

The Future Airborne Capability Environment™ Technical Standard (FACE™ Technical Standard) has been a game-changer in the defense industry, fostering innovation and encouraging the adoption of the Modular Open Systems Approach (MOSA). However, the rapid evolution of the standard poses challenges with respect to adequately assess the impact of changes on existing Department of Defense (DoD) acquisitions. This whitepaper explores this dilemma and proposes a methodology to leverage the National Defense Industrial Association NDIA MOSA Use Case process to inform the applicability and non-applicability of FACE downstream application within the defense sector, while addressing the cost, schedule, and performance trade-offs.

This whitepaper directly supports The Open Group vision: Boundaryless Information Flow by helping to enumerate a more nuanced perspective that will better assist The Open Group FACE Consortium in understanding and satisfying customer requirements. By identifying the realities of DoD acquisitions, further, more informed collaboration can ensue, and guide vested parties in the FACE Technical Standard with its continued maturation and application.


  • Mark Snyder, Senior Scientist, L3 Harris

The Open Universal Domain Description Language (UDDL) standard defines data exchanges tied to software UoPs (Units of Portability) within FACE™ Transport Services (TSS). The Future Airborne Capability Environment™ Technical Standard (FACE Technical Standard) provides the UoP model with features (such as templates and composite templates) that represents data structures that forms the basis of data serialization as well as software interfaces in code.

This paper discusses a means of using the FACE and UDDL languages when they must represent an interface intended to be an ordered message queue, (typical in many serial interface protocols). It discusses ways to use the FACE Template Language along with UDDL elements in a way that translates directly to common TSS implementations. Examples for interfaces that benefit from this technique, including the L3Harris FliteScene digital map, are included.


  • Dr. Hila Ben Abraham, Sr. Research Scientist, Real-Time Innovations, Inc [RTI]
  • Dr. Jason Upchurch, Principal Research Scientist, Real-Time Innovations, Inc [RTI

This document describes recent advances in the state of the art to integrate data-centric cybersecurity into Model-Based System Engineering (MBSE) tools for systems that use the Object Management Group (OMG) Data Distribution Service (DDS) communications framework, elevating the visibility of cybersecurity using a set of first-class modeling constructs. This will enable system designers and security experts to capture, track, and validate cybersecurity requirements. The documented threat policies can then be used to automatically generate all DDS Security configuration files. These can then be further customized for last-mile/last-minute deployment into MOSA systems and Zero Trust environments – bringing true end-to-end cybersecurity process management.

Both the FACE™ Reference Architecture (through the FACE Transport Services Segment (TSS)) and Sensor Open Systems Architecture™ (SOSA) Reference Architecture provide integrations with DDS. However, we believe that additional work will be required to enable these architectures to leverage the benefits of our recent MBSE-related advances in data-centric cybersecurity.

Key points that we discuss:

  • Explaining the difference between data-centric cybersecurity and channel-based cybersecurity for distributed communications
  • Extending the STRIDE security threat model, which is widely used for modeling threats on channel-based communications, to support data-centric communications
  • Improving the Dassault Systems' Cameo Systems Modeler ™ (Cameo), a SysML-based system modeling tool, to support DDS Security's data-centric constructs
1400 1500


Sponsored by    Northrop Grumman
Exhibit hall
1400 1500

Ice Cream Social  

Sponsored by    Abaco
Exhibit Hall
1600 1730 Networking Social Level 4