Disconnected, Intermittent, Limited (DIL) Communications Management Technical Pattern
This pattern describes how a network of connected links with variable link capacity operates to maintain communications service and situational awareness. It describes technology-independent logic for adjusting the capacity of links in a DIL environment as well as supporting features required at several protocol layers.
Read the DIL Communications Management Technical Pattern v2.0

Simple and Extensible Email Services (SEES) Technical Pattern
Proprietary email systems often define their own parameters, sometimes impeding interoperability. This pattern aims to give guidance and specify baseline performance requirements for a simple and extensible email service which is net-centric, robust, secure, seamless and, hence, interoperable.
Read the Simple and Extensible Email Services Technical Pattern

Secure Formatted Information Exchange Gateway (SFIEG) Pattern
The goal of this pattern is to describe a portal between two networks that prevents certain data being released from one network to the other network. This is done by determining, by inspection, whether any message (rather than packet) is marked in a way indicating that it (or part of it) should not be passed on. Alternatively, a message identified as carrying non-releasable information may be modified by the removal or replacement of the non-releasable information before the message is passed on with the remainder of the information intact. This portal is proposed as a filter. It may be used to allow acceptable data to enter a network, as well as to prevent its exit. Nothing in this pattern prevents the incorporation of two opposite directional filters in the same implementation. This pattern proposes a model based on message labeling and filtering, as opposed to packet filtering. Several alternative models may be applicable to an environment, with this model focusing on a messaging framework foundation.
Read the Secure Formatted Information Exchange Gateway Pattern v1.2

Core Network Access (CNA) Pattern
This pattern is part of a set of patterns that describe an encrypted Virtual Private Network (VPN) architecture providing secure interconnections between moveable Local Area Systems (LAS). This pattern describes a method for connecting a number of non-fixed access networks to a fixed-core network. It provides a clear differentiation between non-fixed specialized access networks and the core network that provides long-range information transport between the access networks. Only authenticated and authorized access networks will be permitted to connect to the core network. 
Read the Core Network Access Pattern