Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection
Identifieur interne : 001061 ( Main/Exploration ); précédent : 001060; suivant : 001062Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection
Auteurs : Terrance Goan [États-Unis] ; Emi Fujioka [États-Unis] ; Ryan Kaneshiro [États-Unis] ; Lynn Gasch [États-Unis]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2006.
Abstract
Abstract: In recent years, it has become clear that our ability to create vast information assets far outstrips our ability to exploit and protect them. The Intelligence Community faces particularly significant information management challenges as they seek to: improve information awareness amongst analysts; improve the reliability of intelligence; safely share information with warfighters and allies; and root out malicious insiders. One means to mitigating these challenges is to provide reliable knowledge of the provenance (i.e., lineage) of documents. This knowledge would allow, for instance, analysts to identify source information underpinning an intelligence report.
Url:
DOI: 10.1007/11760146_93
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 003751
- to stream Istex, to step Curation: 003489
- to stream Istex, to step Checkpoint: 000A34
- to stream Main, to step Merge: 001078
- to stream Main, to step Curation: 001061
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection</title>
<author><name sortKey="Goan, Terrance" sort="Goan, Terrance" uniqKey="Goan T" first="Terrance" last="Goan">Terrance Goan</name>
</author>
<author><name sortKey="Fujioka, Emi" sort="Fujioka, Emi" uniqKey="Fujioka E" first="Emi" last="Fujioka">Emi Fujioka</name>
</author>
<author><name sortKey="Kaneshiro, Ryan" sort="Kaneshiro, Ryan" uniqKey="Kaneshiro R" first="Ryan" last="Kaneshiro">Ryan Kaneshiro</name>
</author>
<author><name sortKey="Gasch, Lynn" sort="Gasch, Lynn" uniqKey="Gasch L" first="Lynn" last="Gasch">Lynn Gasch</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:D6C566A89EAA659B09913F471E920D2C8D65DEEC</idno>
<date when="2006" year="2006">2006</date>
<idno type="doi">10.1007/11760146_93</idno>
<idno type="url">https://api.istex.fr/document/D6C566A89EAA659B09913F471E920D2C8D65DEEC/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003751</idno>
<idno type="wicri:Area/Istex/Curation">003489</idno>
<idno type="wicri:Area/Istex/Checkpoint">000A34</idno>
<idno type="wicri:doubleKey">0302-9743:2006:Goan T:identifying:information:provenance</idno>
<idno type="wicri:Area/Main/Merge">001078</idno>
<idno type="wicri:Area/Main/Curation">001061</idno>
<idno type="wicri:Area/Main/Exploration">001061</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection</title>
<author><name sortKey="Goan, Terrance" sort="Goan, Terrance" uniqKey="Goan T" first="Terrance" last="Goan">Terrance Goan</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Washington (État)</region>
</placeName>
<wicri:cityArea>Stottler Henke Associates, Inc., 1107 NE 45th St., Suite 310, 98105, Seattle</wicri:cityArea>
</affiliation>
<affiliation><wicri:noCountry code="no comma">E-mail: goan@stottlerhenke.com</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Fujioka, Emi" sort="Fujioka, Emi" uniqKey="Fujioka E" first="Emi" last="Fujioka">Emi Fujioka</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Washington (État)</region>
</placeName>
<wicri:cityArea>Stottler Henke Associates, Inc., 1107 NE 45th St., Suite 310, 98105, Seattle</wicri:cityArea>
</affiliation>
<affiliation><wicri:noCountry code="no comma">E-mail: emifuji@stottlerhenke.com</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Kaneshiro, Ryan" sort="Kaneshiro, Ryan" uniqKey="Kaneshiro R" first="Ryan" last="Kaneshiro">Ryan Kaneshiro</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Washington (État)</region>
</placeName>
<wicri:cityArea>Stottler Henke Associates, Inc., 1107 NE 45th St., Suite 310, 98105, Seattle</wicri:cityArea>
</affiliation>
<affiliation><wicri:noCountry code="no comma">E-mail: ryank@stottlerhenke.com</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Gasch, Lynn" sort="Gasch, Lynn" uniqKey="Gasch L" first="Lynn" last="Gasch">Lynn Gasch</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Washington (État)</region>
</placeName>
<wicri:cityArea>Stottler Henke Associates, Inc., 1107 NE 45th St., Suite 310, 98105, Seattle</wicri:cityArea>
</affiliation>
<affiliation><wicri:noCountry code="no comma">E-mail: lynng@stottlerhenke.com</wicri:noCountry>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2006</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">D6C566A89EAA659B09913F471E920D2C8D65DEEC</idno>
<idno type="DOI">10.1007/11760146_93</idno>
<idno type="ChapterID">93</idno>
<idno type="ChapterID">Chap93</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: In recent years, it has become clear that our ability to create vast information assets far outstrips our ability to exploit and protect them. The Intelligence Community faces particularly significant information management challenges as they seek to: improve information awareness amongst analysts; improve the reliability of intelligence; safely share information with warfighters and allies; and root out malicious insiders. One means to mitigating these challenges is to provide reliable knowledge of the provenance (i.e., lineage) of documents. This knowledge would allow, for instance, analysts to identify source information underpinning an intelligence report.</div>
</front>
</TEI>
<affiliations><list><country><li>États-Unis</li>
</country>
<region><li>Washington (État)</li>
</region>
</list>
<tree><country name="États-Unis"><region name="Washington (État)"><name sortKey="Goan, Terrance" sort="Goan, Terrance" uniqKey="Goan T" first="Terrance" last="Goan">Terrance Goan</name>
</region>
<name sortKey="Fujioka, Emi" sort="Fujioka, Emi" uniqKey="Fujioka E" first="Emi" last="Fujioka">Emi Fujioka</name>
<name sortKey="Gasch, Lynn" sort="Gasch, Lynn" uniqKey="Gasch L" first="Lynn" last="Gasch">Lynn Gasch</name>
<name sortKey="Kaneshiro, Ryan" sort="Kaneshiro, Ryan" uniqKey="Kaneshiro R" first="Ryan" last="Kaneshiro">Ryan Kaneshiro</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001061 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001061 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= OcrV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:D6C566A89EAA659B09913F471E920D2C8D65DEEC |texte= Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection }}
This area was generated with Dilib version V0.6.32. |