Skip to main content

Assured Information Sharing: Technologies, Challenges and Directions

  • Chapter
Intelligence and Security Informatics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 135))

Abstract

This paper describes issues, technologies, challenges, and directions for Assured Information Sharing (AIS). AIS is about organizations sharing information but at the same time enforcing policies and procedures so that the data is integrated and mined to extract nuggets. This is the first in a series of papers we are writing on AIS. It provides an overview including architectures, functions and policies for AIS. We assume that the partners of a coalition may be trustworthy, semi-trustworthy or untrustworthy and investigate solutions for AIS to handle the different scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Awad, M., Thuraisingham, B., Khan, L., et al.: Assured Information Sharing: vol. 2, Experimental Analysis of Data Integration, Mining and Security, Technical Report, The University of Texas at Dallas, UTDCS44-06 (2006)

    Google Scholar 

  2. Ashraful, A., Thuraisingham, B.: Geography Resource Description Framework (GRDF) and Secure GRDF (S-GRDF), Technical Report, The University of Texas at Dallas, UTDCS-03-06 (January 2006); (also presented at W3C Working Group Meeting (October 2006); and Geospatial semantic web workshop, November 2006 (Athens, GA) (2006)

    Google Scholar 

  3. Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B.: Secure Third Party Publication of XML Documents. IEEE Transactions on Knowledge and Data Engineering (October 2004)

    Google Scholar 

  4. Celikel, E., Kantarcioglu, M., Thuraisingham, B.: Assured Information Sharing: Risk-based Data Sharing. Technical Report, The University of Texas at Dallas (to appear, 2007)

    Google Scholar 

  5. Harris, D., Khan, L., Paul, R., Thuraisingham, B.: Standards for Secure Data Sharing across Organizations. Computer Standards and Interfaces Journal (accepted, 2006)

    Google Scholar 

  6. Jones, A.: Game Theory, Mathematical Models of Conflict. Halstead Press (1980)

    Google Scholar 

  7. Kim, J., Thuraisingham, B.: Dependable and Secure TMO Scheme. In: Proceedings of IEEE ISORC Conference (April 2006) (also UTD report UTDCS-02-06)

    Google Scholar 

  8. Layfield, R., et al.: Design of a Social Network Analysis System. In: Proceedings of the ACM SIGKDD Conference Workshop on Multimedia Data Mining (2005)

    Google Scholar 

  9. Layfield, R., Kantarcioglu, M., Thuraisingham, B.: Assured Information Sharing: vol 3: Using Game Theory to Enforce Honesty Within a Competitive Coalition. Technical Report, The University of Texas at Dallas, UTDCW-46-06 (October 2006)

    Google Scholar 

  10. Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Scientific American (2001)

    Google Scholar 

  11. Liu, L., Kantarcioglu, M., Thuraisingham, N., Khan, L.: An Adaptable Perturbation Model of Privacy Preserving Data Mining. In: Proceedings of the IEEE ICDM Data Mining Conference Workshop on Privacy preserving Data Mining (2005); (also published as technical report, UTDCS-03-06, January 2006)

    Google Scholar 

  12. Vatis, M. (ed.): Markle Report, Creating a Trusted Network for Homeland Security (2003)

    Google Scholar 

  13. Masud, M., Khan, L., Thuraisingham, B., Awad, M.: Detecting New malicious Executables Using Data Mining. UTDCS-27-06 Technical Report, The University of Texas at Dallas (June 2006)

    Google Scholar 

  14. The Implementation of Network Centric Warfare. Office of Force Transformation (2003)

    Google Scholar 

  15. Olivier, M.S.: Self-protecting Objects in a Secure Federated Database. In: Proceedings of the IFIP Database Security Conference, NY (August 1995)

    Google Scholar 

  16. Sandhu, R., Coyne, E., Hal Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer 29(2) (February 1996)

    Google Scholar 

  17. Signal Magazine, AFCEA (May 2005)

    Google Scholar 

  18. Signal Magazine, AFCEA (February 2005)

    Google Scholar 

  19. Spitzner, L.: Honeypots, Tracking Hackers. Addison Wesley, Reading (2002)

    Google Scholar 

  20. Son, S., David, R., Thuraisingham, B.: An Adaptive Policy for Improved Timeliness in Secure Database Systems. In: Proceedings of the 9th IFIP Working Conference in Database Security, New York (August 1995)

    Google Scholar 

  21. Thuraisingham, B.: Novel Approaches to the Inference Problem. In: Proceedings of the 3rd RADC Database Security Workshop, New York (June 1990)

    Google Scholar 

  22. Thuraisingham, B.: Security Issues for Federated Database Systems, December 1994. Computers and Security. North Holland, Amsterdam (1994)

    Google Scholar 

  23. Thuraisingham, B.: Data Mining: Technologies, Techniques, Tools and Trends, December 1998. CRC Press, Boca Raton (1998)

    MATH  Google Scholar 

  24. Thuraisingham, B., Maurer, J.: Information Survivability for Real-time Command and Control Systems. IEEE Transactions on Knowledge and Data Engineering (January 1999)

    Google Scholar 

  25. Thuraisingham, B.: Web Data Mining and Applications in Business Intelligence and Counter-terrorism. CRC Press, Boca Raton (2003)

    Google Scholar 

  26. Thuraisingham, B.: Security Standards for the Semantic Web. Computer Standards and Interfaces Journal (2005)

    Google Scholar 

  27. Thuraisingham, B.: Database and Applications Security: Integrating Information Security and Data Management. CRC Press, Boca Raton (2005)

    MATH  Google Scholar 

  28. Thuraisingham, B.: Assured Information Sharing: vol 1: Overview. Technical Report, The University of Texas at Dallas (2006)

    Google Scholar 

  29. Thuraisingham, B.: Building Trustworthy Semantic Webs, September 2007. CRC Press, Boca Raton (2007)

    Google Scholar 

  30. Tsyblinik, N., Thuraisingham, B., Ashraful, A.: CPT: Confidentiality, Privacy and Trust for the Semantic Web. UTDCS-06-06, Technical Report, the University of Texas at Dallas (March 2006); Also to appear in the Journal of Information Security and Privacy

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hsinchun Chen Christopher C. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Thuraisingham, B. (2008). Assured Information Sharing: Technologies, Challenges and Directions. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69209-6_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69207-2

  • Online ISBN: 978-3-540-69209-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics