Information Operations Across Infospheres
ثبت نشده
چکیده
OF ANNUAL REPORT The research reported in this annual report was carried out mainly at the University of Texas at Dallas (UTD) between December 1, 2007 and November 30, 2008. It describes the issues and challenges for information operations across infospheres and focuses on assured information sharing. We have examined three models: In the first model the partners of the coalition are considered to be trustworthy. In the second model, the partners are semi-trustworthy. In the third model the partners are untrustworthy. The report essentially consists of three parts. We first provide an introduction to the project as well as the developments during Year 3. Impact of this work is also discussed. This introduction was also presented at the AFOSR review in June 2008. In the case of trustworthy models we conducted experiments on data sharing vs. data policy enforcement and developed a prototype system during Year 1 and Year 2. During Year 3 we have developed an approach for group-based information sharing (Part 1). For the semi-trustworthy model we enhanced the research carried out during Year 1 and Year 2. We examined the use of game theory for extracting information from the partners and demonstrated with bioterrorism applications in Year 3 (Part II). For the untrustworthy model, we examined the use of data mining for defensive operations during Year 1 and Year 2. We continued with this research and developed new tools (Part III.A). In addition, we also designed techniques to handle offensive (i.e. active defense) operations (Part III.B). George Mason University (GMU) received a subcontract from the University of Texas at Dallas to examine the use of Role-based Access Control (RBAC) and Usage Control models for Coalition data sharing. The PI moved to UTSA and received the next phase of the funding to work on group-based information sharing (Part 1). While this report discusses the developments during Year 3 of the project, it is also the final report for the project.
منابع مشابه
Information Operations Across Infospheres
There is a critical need for organizations to share data within and across infospheres and form coalitions so that analysts could examine the data, mine the data, and make effective decisions. Each organization could share information within its infosphere. An infosphere may consist of the data, applications and services that are needed for its operation. Organizations may share data with one a...
متن کاملInformation Operations Across Infospheres Annual
This paper describes issues, technologies, challenges, and directions for Assured Information Sharing (AIS). AIS is about organizations sharing information but at the same time enforcing policies and procedures so that the data is integrated and mined to extract nuggets. This is the first in a series of papers we are writing on AIS. It provides an overview including architectures, functions and...
متن کاملIDebug An Advanced Debugging Framework for Java
IDebug the Infospheres debugging framework is an advanced debug ging framework for Java This framework provides the standard core de bugging and speci cation constructs such as assertions debug levels and categories stack traces and specialized exceptions Debugging function ality can be ne tuned to a per thread and or a per class basis debugging contexts can be stored to and recovered from pers...
متن کاملA Framework for the Representation of Geospatial Image Processing Operations
Research advances in geospatial automated image analysis tools and feature extraction algorithms have matured in recent times to levels of practical applicability. The consolidation of such tools and algorithms would result in enhanced image analysis capabilities. This has motivated research in developing formalisms for representation of process information that can assist in integrating tools ...
متن کاملMands for information generalize across establishing operations.
The current study extends the literature on teaching mands for information by assessing whether mands generalize across different establishing operations (EOs). Three children with autism were taught to perform multiple behavior chains, 3 of which included a common response (e.g., "Where is the spoon?") used for different purposes. An interrupted-behavior-chain procedure was used to contrive th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008