Wikipedia:Articles for deletion/Controlled interface
Appearance
From Wikipedia, the free encyclopedia
- The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.
The result was merge to some other article. The merge target is not yet clear and should be determined by further discussion. Sandstein 10:26, 6 January 2011 (UTC)[reply]
- Controlled interface (edit | talk | history | protect | delete | links | watch | logs | views) – (View log)
- (Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL)
Unreferenced jargon definition that doesn't indicate notability. Only one inbound link. Pnm (talk) 04:23, 21 December 2010 (UTC)[reply]
- Note: This debate has been included in the list of Computing-related deletion discussions. -- • Gene93k (talk) 01:24, 22 December 2010 (UTC)[reply]
- Relisted to generate a more thorough discussion so a clearer consensus may be reached.
Please add new comments below this notice. Thanks, Ron Ritzman (talk) 23:58, 27 December 2010 (UTC)[reply]
Delete This appears to be a piece of jargon used by US government's Committee on National Security Systemsin to refer to the capabilities of its Intelligence Community System for
Information Sharing. Aside from DHS usage, I can't find any coherent definition of just that term. In general usage this phrase usually appears to refer to a specific method of control, e.g. "brain controlled interface". An article only on this one exceptional use only serves to confuse. merge, deferring to the experts ˉˉanetode╦╩ 03:06, 28 December 2010 (UTC)[reply]
- Merge & Redirect (assuming anything can be sourced) to Unidirectional network. This appears to be the most appropriate subject for it to be covered in. Turlo Lomon (talk) 15:54, 28 December 2010 (UTC)[reply]
- Either Keep this stub, which does have possibilities, or Merge to Multilevel security. Data diodes can only do the job in the simplest of cases, and the security domains involved may reside on a single computer without any involvement of networks. --Lambiam 23:01, 28 December 2010 (UTC)[reply]
- Any chance you would track down some references for the content you added? I'd like evidence it meets WP:GNG. --Pnm (talk) 23:30, 28 December 2010 (UTC)[reply]
- As a general reference for the whole article this (rather old) Network Security Reference Guide could be used, produced by the Defense Security Service. Beyond that, I'm afraid I can't be of help there; some entries coughed up by Google scholar search look promising but lead to journals I have no free access to; what I could find and access generally reads like product blurbs and is useless here. The MLS research agenda is set entirely by the U.S. military, and results obtained are not of intrinsic academic (and even less of general public) interest. The best hope may be some kind of tutorial, but I couldn't find any. --Lambiam 21:00, 29 December 2010 (UTC)[reply]
- Any chance you would track down some references for the content you added? I'd like evidence it meets WP:GNG. --Pnm (talk) 23:30, 28 December 2010 (UTC)[reply]
- The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.