Information Operations Across Infospheres

ثبت نشده
چکیده

OF ANNUAL REPORT The research reported in this annual report was carried out mainly at the University of Texas at Dallas (UTD) between December 1, 2007 and November 30, 2008. It describes the issues and challenges for information operations across infospheres and focuses on assured information sharing. We have examined three models: In the first model the partners of the coalition are considered to be trustworthy. In the second model, the partners are semi-trustworthy. In the third model the partners are untrustworthy. The report essentially consists of three parts. We first provide an introduction to the project as well as the developments during Year 3. Impact of this work is also discussed. This introduction was also presented at the AFOSR review in June 2008. In the case of trustworthy models we conducted experiments on data sharing vs. data policy enforcement and developed a prototype system during Year 1 and Year 2. During Year 3 we have developed an approach for group-based information sharing (Part 1). For the semi-trustworthy model we enhanced the research carried out during Year 1 and Year 2. We examined the use of game theory for extracting information from the partners and demonstrated with bioterrorism applications in Year 3 (Part II). For the untrustworthy model, we examined the use of data mining for defensive operations during Year 1 and Year 2. We continued with this research and developed new tools (Part III.A). In addition, we also designed techniques to handle offensive (i.e. active defense) operations (Part III.B). George Mason University (GMU) received a subcontract from the University of Texas at Dallas to examine the use of Role-based Access Control (RBAC) and Usage Control models for Coalition data sharing. The PI moved to UTSA and received the next phase of the funding to work on group-based information sharing (Part 1). While this report discusses the developments during Year 3 of the project, it is also the final report for the project.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Operations Across Infospheres

There is a critical need for organizations to share data within and across infospheres and form coalitions so that analysts could examine the data, mine the data, and make effective decisions. Each organization could share information within its infosphere. An infosphere may consist of the data, applications and services that are needed for its operation. Organizations may share data with one a...

متن کامل

Information Operations Across Infospheres Annual

This paper describes issues, technologies, challenges, and directions for Assured Information Sharing (AIS). AIS is about organizations sharing information but at the same time enforcing policies and procedures so that the data is integrated and mined to extract nuggets. This is the first in a series of papers we are writing on AIS. It provides an overview including architectures, functions and...

متن کامل

IDebug An Advanced Debugging Framework for Java

IDebug the Infospheres debugging framework is an advanced debug ging framework for Java This framework provides the standard core de bugging and speci cation constructs such as assertions debug levels and categories stack traces and specialized exceptions Debugging function ality can be ne tuned to a per thread and or a per class basis debugging contexts can be stored to and recovered from pers...

متن کامل

A Framework for the Representation of Geospatial Image Processing Operations

Research advances in geospatial automated image analysis tools and feature extraction algorithms have matured in recent times to levels of practical applicability. The consolidation of such tools and algorithms would result in enhanced image analysis capabilities. This has motivated research in developing formalisms for representation of process information that can assist in integrating tools ...

متن کامل

Mands for information generalize across establishing operations.

The current study extends the literature on teaching mands for information by assessing whether mands generalize across different establishing operations (EOs). Three children with autism were taught to perform multiple behavior chains, 3 of which included a common response (e.g., "Where is the spoon?") used for different purposes. An interrupted-behavior-chain procedure was used to contrive th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008