Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems

نویسندگان

  • T. S. Raghu
  • Hsinchun Chen
چکیده

Most disaster scenarios faced by agencies entrustedwith homeland security require timely access to relevant information that can be sensed and acted upon. However, the required data and information often reside in silos that are isolated from each other due to jurisdictional boundaries or representational incompatibilities. Given the nature of the threat to homeland security, regional, cross-institutional data sharing is a necessary first step towards effective crisis response measures. The purpose of this special issue is to encourage research discussions of practical and novel cyberinfrastructure technologies, techniques, methods, practices, and systems that can contribute to knowledge in this important emerging area. The intent was to publish relevant work that contribute to the application of state-of-the-art knowledge of information sharing, data mining or collaboration systems to the context of homeland security. The 2003 NSF Workshop on “Cyberinfrastructure Research for Homeland Security” defined Cyberinfrastructure as a key technology enabler that facilitates the federation of distributed information and knowledge resources to reduce constraints of distance and time. Cy-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Homeland Security Data Mining Using Social Network Analysis

The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon to help enhance the government’s ability to fight terrorism and other crimes. Keeping in mind the special characteristics of crimes and securityrelated data, data mining techniques can contribute in six areas of resear...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Recommender Systems for Intelligence Analysts

Homeland security intelligence analysts need help finding relevant information quickly in a rapidly increasing volume of incoming raw data. Many different AI techniques are needed to handle this deluge of data. This paper describes initial investigations in the application of recommender systems to this problem. It illustrates various recommender systems technologies and suggests scenarios for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Decision Support Systems

دوره 43  شماره 

صفحات  -

تاریخ انتشار 2007