Abstract
This paper describes issues, technologies, challenges, and directions for Assured Information Sharing (AIS). AIS is about organizations sharing information but at the same time enforcing policies and procedures so that the data is integrated and mined to extract nuggets. This is the first in a series of papers we are writing on AIS. It provides an overview including architectures, functions and policies for AIS. We assume that the partners of a coalition may be trustworthy, semi-trustworthy or untrustworthy and investigate solutions for AIS to handle the different scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Awad, M., Thuraisingham, B., Khan, L., et al.: Assured Information Sharing: vol. 2, Experimental Analysis of Data Integration, Mining and Security, Technical Report, The University of Texas at Dallas, UTDCS44-06 (2006)
Ashraful, A., Thuraisingham, B.: Geography Resource Description Framework (GRDF) and Secure GRDF (S-GRDF), Technical Report, The University of Texas at Dallas, UTDCS-03-06 (January 2006); (also presented at W3C Working Group Meeting (October 2006); and Geospatial semantic web workshop, November 2006 (Athens, GA) (2006)
Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B.: Secure Third Party Publication of XML Documents. IEEE Transactions on Knowledge and Data Engineering (October 2004)
Celikel, E., Kantarcioglu, M., Thuraisingham, B.: Assured Information Sharing: Risk-based Data Sharing. Technical Report, The University of Texas at Dallas (to appear, 2007)
Harris, D., Khan, L., Paul, R., Thuraisingham, B.: Standards for Secure Data Sharing across Organizations. Computer Standards and Interfaces Journal (accepted, 2006)
Jones, A.: Game Theory, Mathematical Models of Conflict. Halstead Press (1980)
Kim, J., Thuraisingham, B.: Dependable and Secure TMO Scheme. In: Proceedings of IEEE ISORC Conference (April 2006) (also UTD report UTDCS-02-06)
Layfield, R., et al.: Design of a Social Network Analysis System. In: Proceedings of the ACM SIGKDD Conference Workshop on Multimedia Data Mining (2005)
Layfield, R., Kantarcioglu, M., Thuraisingham, B.: Assured Information Sharing: vol 3: Using Game Theory to Enforce Honesty Within a Competitive Coalition. Technical Report, The University of Texas at Dallas, UTDCW-46-06 (October 2006)
Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Scientific American (2001)
Liu, L., Kantarcioglu, M., Thuraisingham, N., Khan, L.: An Adaptable Perturbation Model of Privacy Preserving Data Mining. In: Proceedings of the IEEE ICDM Data Mining Conference Workshop on Privacy preserving Data Mining (2005); (also published as technical report, UTDCS-03-06, January 2006)
Vatis, M. (ed.): Markle Report, Creating a Trusted Network for Homeland Security (2003)
Masud, M., Khan, L., Thuraisingham, B., Awad, M.: Detecting New malicious Executables Using Data Mining. UTDCS-27-06 Technical Report, The University of Texas at Dallas (June 2006)
The Implementation of Network Centric Warfare. Office of Force Transformation (2003)
Olivier, M.S.: Self-protecting Objects in a Secure Federated Database. In: Proceedings of the IFIP Database Security Conference, NY (August 1995)
Sandhu, R., Coyne, E., Hal Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer 29(2) (February 1996)
Signal Magazine, AFCEA (May 2005)
Signal Magazine, AFCEA (February 2005)
Spitzner, L.: Honeypots, Tracking Hackers. Addison Wesley, Reading (2002)
Son, S., David, R., Thuraisingham, B.: An Adaptive Policy for Improved Timeliness in Secure Database Systems. In: Proceedings of the 9th IFIP Working Conference in Database Security, New York (August 1995)
Thuraisingham, B.: Novel Approaches to the Inference Problem. In: Proceedings of the 3rd RADC Database Security Workshop, New York (June 1990)
Thuraisingham, B.: Security Issues for Federated Database Systems, December 1994. Computers and Security. North Holland, Amsterdam (1994)
Thuraisingham, B.: Data Mining: Technologies, Techniques, Tools and Trends, December 1998. CRC Press, Boca Raton (1998)
Thuraisingham, B., Maurer, J.: Information Survivability for Real-time Command and Control Systems. IEEE Transactions on Knowledge and Data Engineering (January 1999)
Thuraisingham, B.: Web Data Mining and Applications in Business Intelligence and Counter-terrorism. CRC Press, Boca Raton (2003)
Thuraisingham, B.: Security Standards for the Semantic Web. Computer Standards and Interfaces Journal (2005)
Thuraisingham, B.: Database and Applications Security: Integrating Information Security and Data Management. CRC Press, Boca Raton (2005)
Thuraisingham, B.: Assured Information Sharing: vol 1: Overview. Technical Report, The University of Texas at Dallas (2006)
Thuraisingham, B.: Building Trustworthy Semantic Webs, September 2007. CRC Press, Boca Raton (2007)
Tsyblinik, N., Thuraisingham, B., Ashraful, A.: CPT: Confidentiality, Privacy and Trust for the Semantic Web. UTDCS-06-06, Technical Report, the University of Texas at Dallas (March 2006); Also to appear in the Journal of Information Security and Privacy
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Thuraisingham, B. (2008). Assured Information Sharing: Technologies, Challenges and Directions. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-69209-6_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69207-2
Online ISBN: 978-3-540-69209-6
eBook Packages: EngineeringEngineering (R0)