1 Information Operations Across Infospheres
Abstract
There is a critical need for organizations to share data within and across infospheres and form coalitions so that analysts could examine the data, mine the data, and make effective decisions. Each organization could share information within its infosphere. An infosphere may consist of the data, applications and services that are needed for its operation. Organizations may share data with one another across what is called a global infosphere that spans multiple infospheres. It is critical that the war fighters get timely information. Furthermore, secure data and information sharing is an important requirement. The challenge is for data processing techniques to meet timing constraints and at the same time ensure that security is maintained. This proposal addresses information operations across infospheres. We first describe secure timely data sharing across infospheres and then focus on Role-based access control and Usage control in such an environment. Our goal is to send timely inf...
References (84)
- M. Awad, B. Thuraisingham, and L. Khan, et al, Assured Information Sharing: Volume 2: Experimental Analysis of Data Integration, Mining and Security, Technical Report, The University of Texas at Dallas, 2006 (to appear)
- A. Ashraful, G. Subbiah, L. Khan, and B. Thuraisingham, Geospatial Semantic Web, Technical Report, The University of Texas at Dallas, 2006 (to appear).
- E. Bertino, B. Carminati, E. Ferrari and B. Thuraisingham, Secure Third Party Publication of XML Documents, IEEE Transactions on Knowledge and Data Engineering, October 2004
- E. Celikel, M. Kantarcioglu and B. Thuraisingham, Assured Information Sharing: Risk- based Data Sharing, Technical Report, The University of Texas at Dallas, 2006 (to appear)
- A. Jones, Game Theory, Mathematical Models of Conflict, Halstead Press, 1980.
- L. Khan, B. Thuraisingham et al, Assured Information Sharing: Volume 4: Data Mining Applications for Defensive Operations in a Coalition, Technical Report, The University of Texas at Dallas, (to appear).
- J. Kim and B. Thuraisingham, Dependable and Secure TMO Scheme, Proceedings of IEEE ISORC Conference, April 006.
- J. Kim, B. Thuraisingham, et al, Data Provenance in Healthcare Systems: Survey and Research Issues, UTD Technical Report, to appear.
- J. Kim and B. Thuraisingham, Applying RBAC and UCON to TMO, Technical report, University of Texas at Dallas, to appear.
- G. Lavee et al, Suspicious Event Detection with Surveillance Data, Proceedings of the ACM SIGKDD Conference Workshop on Multimedia Data Mining, 2005.
- R. Layfield, et al, Design of a Social Network Analysis System, Proceedings of the ACM SIGKDD Conference Workshop on Multimedia Data Mining, 2005.
- R. Layfield, M. Kantarcioglu and B. Thuraisingham, Assured Information Sharing: Volume 3: Using Game Theory to Enforce Honesty Within a Competitive Coalition, Technical Report, The University of Texas at Dallas, 2006 (to appear)
- Berners Lee, T., et al., The Semantic Web, Scientific American, May 2001.
- L. Liu, M. Kantarcioglu, N. Thuraisingham, L. Khan, An Adaptable Perturbation Model of Privacy Preserving Data Mining, Proceedings of the IEEE ICDM Data Mining Conference Workshop on Privacy preserving Data Mining, 2005 (also published as technical report, UTDCS- 03-06, January 2006).
- L. Liu, et al, Privacy Preserving Data Sharing, Technical Report, The University of Texas at Dallas, 2006 (to appear)
- Creating a Trusted Network for Homeland Security, Markle Report, 2003 (Editor: M. Vatis)
- Masud, M, L. Khan, B. Thuraisingham and M. Awad, Detecting New malicious Executables Using Data Mining, UTDCS-27-06 Technical Report, The University of Texas at Dallas, June 2006, also submitted for publications. (version to be published as UTD AIS Technical Report series)
- The Implementation of Network Centric Warfare, Office of Force Transformation, 2003.
- Martin S. Olivier: Self-protecting Objects in a Secure Federated Database, Proceedings of the IFIP Database Security Conference, NY, August 1995.
- Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, "Role-Based Access Control Models." IEEE Computer, Volume 29, Number 2, February 1996.
- R. Sandhu et al, RBAC for AIS, to be published as AIS Technical Report Series, 2006.
- Signal Magazine, AFCEA, May 2005
- Signal Magazine, AFCEA, February 2005
- Lance Spitzner, Honeypots, Tracking Hackers, Addison Wesley, 2002.
- S. Son, R. David and B. Thuraisingham, An Adaptive Policy for Improved Timeliness in Secure Database Systems, Proceedings of the 9th IFIP Working Conference in Database Security, New York, August 1995.
- B. Thuraisingham, Novel Approaches to the Inference Problem, June 1990, Proceedings of the 3rd RADC Database Security Workshop, New York.
- B. Thuraisingham, Security Issues for Federated Database Systems, 1994, Computers and Security (North Holland), December 1994.
- B. Thuraisingham, Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, December 1998.
- B. Thuraisingham and J. Maurer, Information Survivability for Real-time Command and Control Systems, IEEE Transactions on Knowledge and Data Engineering, January 1999
- B. Thuraisingham, Web Data Mining and Applications in Business Intelligence and Counter-terrorism, CRC Press, Boca Raton, FL, 2003.
- B. Thuraisingham, Security Standards for the Semantic Web, Computer Standards and Interfaces Journal, 2005.
- B. Thuraisingham, Database and Applications Security: Integrating Information Security and Data Management, CRC Press, May 2005
- B. Thuraisingham, D. Harris, L. Khan, R. Paul, "Standards for Secure Data Sharing across Organizations," Accepted in Computer Standards and Interfaces Journal, 2005. (version to be published as part of UTD AIS technical report series)
- N. Tsybulnik, B. Thuraisingham, A. Ashraful, CPT: Confidentiality, Privacy and Trust for the Semantic Web,UTDCS-06-06, Technical Report, the University of Texas at Dallas, March 2006, Also to appear in the Journal of Information Security and Privacy.
- J. Zhu, B. Thuraisingham, Grid Computing and Grid Security, Technical; Report, The University of Texas at Dallas, to appear. (also published in International Journal of Computer and Network Secuirty, August 2006). References
- P. Scerri, Y. Xu, E. Liao, J. Lai, M. Lewis, K. Sycara. Coordinating very large groups of wide area search munitions, Recent Developments in Cooperative Control and Optimization, Dordrecht, NL: Kluwer Academic Publishers.
- M. H. Burstein and D. E. Diller. A framework for dynamic informationflow in mixed-initiative human/agent organizations. Applied Intelligence on Agents and Process Management, 2004. Forthcoming.
- K. Decker, K. Sycara, A. Pannu and M. Williamson.Designing behaviors for information agents. Procs. Of the First International Conference on Autonomous Agents, Feb., 1997.
- P. R. Cohen, H. J. Levesque and I. Smith. On team formation.In J. Hintikka and R. Tuomela, editors, Contemporary Action Theory, Synthese,1998
- K. C. Jim and C.L. Giles. How communication can improve the performance of multi-agent systems. In Proceedings of Autonomous agents'01, 584-591, 2001.
- P. Scerri, Y. Xu, E. Liao, J. Lai, K. Sycara. Scaling Teamwork to Very Large Teams, AAMAS 04, Forthcoming, 2004.
- D. Pynadath and M. Tambe. The communicative multiagent team decision problem: analyzing teamwork theories and models. Journal of Artificial Intelligence Research, Vol.16, pages 389-423, 2002.
- J. Yen, J. Yin, T. R. Ioerger, M. S. Miller, D. Xu and R. A. Volz. Cast: Collaborative agents for simulating teamwork. In Proceedings of IJCAI'01, pages 1135-1142, 2001.
- P. Xuan, V. Lesser and S. Zilberstein. Communication decisions in multiagent cooperation: Model and experiments. In Proceedings of Autonomous Agents'01, 2001. [10] C.V. Goldman and S. Zilberstein. Optimizing information exchange in cooperative multi-agent systems. Proceedings of the Second International Conference on Autonomous Agents and Multi-agent Systems, 2003.
- C.V. Goldman and S. Zilberstein. Mechanism design for communication in cooperative systems. Game Theoretic and Decision Theoretic Agents Workshop at AAMAS' 03, July, 2003.
- H.H. Bui, S. Venkatesh and D. Kieronska. A framework for coordination and learning among team members. In Proceedings of the Third Australian Workshop on Distributed AI (DAI- 97), pages 116-126, Perth, Australia.
- M.V. Wie. A probabilistic method for team plan formation without communication. Proceedings of the Fourth International Conference on Autonomous Agents, pages 112-113, Barcelona, Spain, June 3-7, 2000.
- R. Albert and A. Barabasi. Statistical mechanics of complex networks. Review Modern Physics, 74, 47,2002.
- M. E. J. Newman. The structure and function of complex networks. SIAM Review, Vol. 45, No. 2, pages 167-256, 2003.
- D. Watts and S. Strogatz. Collective dynamics of small world networks. Nature, 393:440- 442, 1998. the practical application of such work to the real world, but we believe that it is within reason to expect that such strategies could greatly benefit intelligence sharing within coalitions.
- References
- Axelrod, Robert, The Evolution of Cooperation. Basic Books, New York, 1985.
- Buragohain, C., D. Agrawal, and S. Suri. "A game theoretic framework for incentives in P2P systems." Proceedings from the Third International Conference on Peer-to-Peer Computing, 2003.
- Cohen, Brian. "Incentives Build Robustness in BitTorrent" In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, June 2003.
- Gupta, Rohit. and A. K. Somani. "Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networks." Proceedings from the 11 th International Conference on Parallel and Distributed Systems, 2005.
- Halpern, Joseph and V. Teague, "Rational secret sharing and multiparty computation: extended abstract". Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, 2004.
- Harsanyi, John C., "Games with incomplete information played by 'Bayesian' players." Management Science, vol. 14, 1967.
- Myerson, Roger B., Game Theory: Analysis of Conflict. Harvard University Press, 1997.
- Nash, John, "Equilibrium Points in n-Person Games." Proceedings of the National Academy of Sciences USA, 36:48-49, 1950.
- Osbourne, Martin J. and A. Rubinstein, A Course in Game Theory. MIT Press, Cambridge, Mass., 1994.
- Scott, John. Social Network Analysis : a Handbook. Sage Publications, London, 1985. BIBLIOGRAPHICAL REFERENCES
- Golbeck, J., and Hendler, J. Reputation network analysis for email filtering. In CEAS (2004).
- Newman, M. E. J., Forrest, S., and Balthrop, J. Email networks and the spread of computer viruses. Physical Review E 66, 035101 (2002).
- Schultz, M., Eskin, E., and Zadok, E. MEF: Malicious email filter, a UNIX mail filter that detects malicious windows executables. In USENIX Annual Technical Conference -FREENIX Track (June 2001).
- Singh, S., Estan, C., Varghese, G., and Savage, S. The EarlyBird System for Real-time Detection of Unknown Worms. Technical report -cs2003-0761, UCSD, 2003.
- Kim, H. A. and Karp, B., Autograph: Toward Automated, Distributed Worm Signature Detection. in the Proceedings of the 13th Usenix Security Symposium (Security 2004), San Diego, CA, August, 2004.
- J. Newsome, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures for Polymorphic Worms. In Proceedings of the IEEE Symposium on Security and Privacy, May 2005.
- M. Schultz, E. Eskin, E. Zadok, S. Stolfo, Data mining methods for detection of new malicious executables, in: Proc. IEEE Symposium on Security and Privacy, 2001, pp. 178--184.
- Kolter, J. Z., and Maloof, M. A. Learning to detect malicious executables in the wild. Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining Seattle, WA, USA Pages: 470 -478, 2004.
- Cygnus. GNU Binutils Cygwin. Online publication, 1999. http://sourceware.cygnus.com/cygwin [11] Windows P.E. Disassembler. http://www.geocities.com/~sangcho/index.html
- GoodRich, M. T., and Tamassia, R. Data structures and algorithms in Java. John Wiley & Sons, Inc. ISBN: 0-471-73884-0.
- Mitchell, T. Machine Learning. McGraw Hill, 1997.
- Weka: collection of machine learning algorithms for data mining tasks. http://www.cs.waikato.ac.nz/ml/weka/
- VX-Heavens: http://vx.netlux.org/
- Mohammad Al-Kahtani and Ravi Sandhu, "A Model for Attribute-Based User-Role Assignment." Proc. 17 th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 9-13, 2002, pages 353-362.
- David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and Ramaswamy Chandramouli. "Proposed NIST Standard for Role-Based Access Control." ACM Transactions on Information and System Security, Volume 4, Number 3, August 2001, pages 224-274.
- Savith Kandala and Ravi Sandhu, "Secure Role-Based Workflow Models." Database Security XV: Status and Prospects, (D. Spooner, editor), Kluwer 2002.
- Alexander Liu, Cheryl Martin, Tom Hetherington, and Sara Matzner, A Comparison of System Call Feature Representations for Insider Threat Detection, Proceedings of the 2005 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY June 2005 [PARK04] Jaehong Park and Ravi Sandhu. "The UCON ABC Usage Control Model." ACM Transactions on Information and System Security, Volume 7, Number 1, February 2004.
- James Pitkow and Peter Pirolli. Mining longest repeating subsequences to predict World Wide Web surfing. In Proc. of 2 nd USENIX Symposium on Internet Technologies and Systems (USITS'99).Boulder, Colorado, October 1999.
- Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, "Role-Based Access Control Models." IEEE Computer, Volume 29, Number 2, February 1996.
- B. Thuraisingham, Security Standards for the Semantic Web, Computer Standards and Interface Journal, March 2005.
- B. Thuraisingham, Managing Cyber Threats: Issues and Challenges, Kluwer (editor: V. Kumar et al), Kluwer, 2005.
- Roshan Thomas and Ravi Sandhu, "Towards a Multi-Dimensional Characterization of Dissemination Control." Proc. 5 th IEEE International Workshop on Policies for Distributed Systems and Networks, New York, June 7-9, 2004, pages 197-200.
- Xinwen Zhang and Ravi Sandhu, "Peer-to-Peer Access Control Architecture Using Trusted Computing Technology." Proc. 10th ACM Symposium on Access Control Models and Technologies (SACMAT), Stockholm, June 1-3, 2005.