Serveur d'exploration sur l'OCR

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection

Identifieur interne : 001061 ( Main/Exploration ); précédent : 001060; suivant : 001062

Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection

Auteurs : Terrance Goan [États-Unis] ; Emi Fujioka [États-Unis] ; Ryan Kaneshiro [États-Unis] ; Lynn Gasch [États-Unis]

Source :

RBID : ISTEX:D6C566A89EAA659B09913F471E920D2C8D65DEEC

Abstract

Abstract: In recent years, it has become clear that our ability to create vast information assets far outstrips our ability to exploit and protect them. The Intelligence Community faces particularly significant information management challenges as they seek to: improve information awareness amongst analysts; improve the reliability of intelligence; safely share information with warfighters and allies; and root out malicious insiders. One means to mitigating these challenges is to provide reliable knowledge of the provenance (i.e., lineage) of documents. This knowledge would allow, for instance, analysts to identify source information underpinning an intelligence report.

Url:
DOI: 10.1007/11760146_93


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection</title>
<author>
<name sortKey="Goan, Terrance" sort="Goan, Terrance" uniqKey="Goan T" first="Terrance" last="Goan">Terrance Goan</name>
</author>
<author>
<name sortKey="Fujioka, Emi" sort="Fujioka, Emi" uniqKey="Fujioka E" first="Emi" last="Fujioka">Emi Fujioka</name>
</author>
<author>
<name sortKey="Kaneshiro, Ryan" sort="Kaneshiro, Ryan" uniqKey="Kaneshiro R" first="Ryan" last="Kaneshiro">Ryan Kaneshiro</name>
</author>
<author>
<name sortKey="Gasch, Lynn" sort="Gasch, Lynn" uniqKey="Gasch L" first="Lynn" last="Gasch">Lynn Gasch</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:D6C566A89EAA659B09913F471E920D2C8D65DEEC</idno>
<date when="2006" year="2006">2006</date>
<idno type="doi">10.1007/11760146_93</idno>
<idno type="url">https://api.istex.fr/document/D6C566A89EAA659B09913F471E920D2C8D65DEEC/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003751</idno>
<idno type="wicri:Area/Istex/Curation">003489</idno>
<idno type="wicri:Area/Istex/Checkpoint">000A34</idno>
<idno type="wicri:doubleKey">0302-9743:2006:Goan T:identifying:information:provenance</idno>
<idno type="wicri:Area/Main/Merge">001078</idno>
<idno type="wicri:Area/Main/Curation">001061</idno>
<idno type="wicri:Area/Main/Exploration">001061</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection</title>
<author>
<name sortKey="Goan, Terrance" sort="Goan, Terrance" uniqKey="Goan T" first="Terrance" last="Goan">Terrance Goan</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Washington (État)</region>
</placeName>
<wicri:cityArea>Stottler Henke Associates, Inc., 1107 NE 45th St., Suite 310, 98105, Seattle</wicri:cityArea>
</affiliation>
<affiliation>
<wicri:noCountry code="no comma">E-mail: goan@stottlerhenke.com</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Fujioka, Emi" sort="Fujioka, Emi" uniqKey="Fujioka E" first="Emi" last="Fujioka">Emi Fujioka</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Washington (État)</region>
</placeName>
<wicri:cityArea>Stottler Henke Associates, Inc., 1107 NE 45th St., Suite 310, 98105, Seattle</wicri:cityArea>
</affiliation>
<affiliation>
<wicri:noCountry code="no comma">E-mail: emifuji@stottlerhenke.com</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Kaneshiro, Ryan" sort="Kaneshiro, Ryan" uniqKey="Kaneshiro R" first="Ryan" last="Kaneshiro">Ryan Kaneshiro</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Washington (État)</region>
</placeName>
<wicri:cityArea>Stottler Henke Associates, Inc., 1107 NE 45th St., Suite 310, 98105, Seattle</wicri:cityArea>
</affiliation>
<affiliation>
<wicri:noCountry code="no comma">E-mail: ryank@stottlerhenke.com</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Gasch, Lynn" sort="Gasch, Lynn" uniqKey="Gasch L" first="Lynn" last="Gasch">Lynn Gasch</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Washington (État)</region>
</placeName>
<wicri:cityArea>Stottler Henke Associates, Inc., 1107 NE 45th St., Suite 310, 98105, Seattle</wicri:cityArea>
</affiliation>
<affiliation>
<wicri:noCountry code="no comma">E-mail: lynng@stottlerhenke.com</wicri:noCountry>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2006</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">D6C566A89EAA659B09913F471E920D2C8D65DEEC</idno>
<idno type="DOI">10.1007/11760146_93</idno>
<idno type="ChapterID">93</idno>
<idno type="ChapterID">Chap93</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: In recent years, it has become clear that our ability to create vast information assets far outstrips our ability to exploit and protect them. The Intelligence Community faces particularly significant information management challenges as they seek to: improve information awareness amongst analysts; improve the reliability of intelligence; safely share information with warfighters and allies; and root out malicious insiders. One means to mitigating these challenges is to provide reliable knowledge of the provenance (i.e., lineage) of documents. This knowledge would allow, for instance, analysts to identify source information underpinning an intelligence report.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>États-Unis</li>
</country>
<region>
<li>Washington (État)</li>
</region>
</list>
<tree>
<country name="États-Unis">
<region name="Washington (État)">
<name sortKey="Goan, Terrance" sort="Goan, Terrance" uniqKey="Goan T" first="Terrance" last="Goan">Terrance Goan</name>
</region>
<name sortKey="Fujioka, Emi" sort="Fujioka, Emi" uniqKey="Fujioka E" first="Emi" last="Fujioka">Emi Fujioka</name>
<name sortKey="Gasch, Lynn" sort="Gasch, Lynn" uniqKey="Gasch L" first="Lynn" last="Gasch">Lynn Gasch</name>
<name sortKey="Kaneshiro, Ryan" sort="Kaneshiro, Ryan" uniqKey="Kaneshiro R" first="Ryan" last="Kaneshiro">Ryan Kaneshiro</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001061 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001061 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    OcrV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:D6C566A89EAA659B09913F471E920D2C8D65DEEC
   |texte=   Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Sat Nov 11 16:53:45 2017. Site generation: Mon Mar 11 23:15:16 2024