Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection

  • Terrance Goan
  • Emi Fujioka
  • Ryan Kaneshiro
  • Lynn Gasch
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)

Abstract

In recent years, it has become clear that our ability to create vast information assets far outstrips our ability to exploit and protect them. The Intelligence Community faces particularly significant information management challenges as they seek to: improve information awareness amongst analysts; improve the reliability of intelligence; safely share information with warfighters and allies; and root out malicious insiders. One means to mitigating these challenges is to provide reliable knowledge of the provenance (i.e., lineage) of documents. This knowledge would allow, for instance, analysts to identify source information underpinning an intelligence report.

Keywords

Suffix Tree Reliable Knowledge Intelligence Community Information Awareness Information Provenance 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Ferragina, P., Grossi, R.: The String B-Tree: A New Data Structure for String Search in External Memory and its Applications. Journal of the ACM 46(2), 236–280 (1999)MATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    Gusfield, D.: Algorithms on strings, trees, and sequences: computer science and computational biology. Cambridge University Press, Cambridge (1997)MATHCrossRefGoogle Scholar
  3. 3.
    Hoad, T., Zobel, J.: Methods for identifying versioned and plagiarized documents. JASIST 54(3), 203–215 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Terrance Goan
    • 1
  • Emi Fujioka
    • 1
  • Ryan Kaneshiro
    • 1
  • Lynn Gasch
    • 1
  1. 1.Stottler Henke Associates, Inc.Seattle

Personalised recommendations