6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Harm Schotanus et al.<br />
facilitates the publication of descriptions of (multiple) resources. The goal of the POWDER working<br />
group has been to develop a mechanism that allows not only the provision of descriptions but also a<br />
way to apply them to groups of (online) resources and for the authentication of those descriptions in<br />
relation to establishing a trust level of those descriptions.<br />
2.2 Possibilities of meta-information within a single network<br />
2.2.1 Information Lifecycle Management<br />
Information Lifecycle Management is about the different lifecycle phases that information can go<br />
through, from the creation of information, via different manipulations or updates to the deletion of<br />
information or at least archiving the information for future reference. Easy accessible meta-information<br />
can facilitate Information Lifecycle Management and create new possibilities. For example, with more<br />
meta-information available, information objects could also be archived for different reasons. For<br />
example archive every file that was created by ‘Danielle Zeeg’ because she no longer works at the<br />
company or archive every information object that has been tagged as ‘SFOR’ because that mission<br />
has ended.<br />
Similar to the archiving scenario aiding users or administrators in searching for information can also<br />
benefit from having more meta-information available. For instance search all information objects that<br />
carry file extension ‘pdf’ and are created in 2010 and have been authored by ‘Kees de Witte’ and have<br />
been tagged with ‘SFOR’.<br />
2.2.2 Integrity protection<br />
It is also possible to embed integrity protection capabilities in meta-information. For example by<br />
creating a digital signature of the information, the signature can later be used to verify information has<br />
been changed or validate who created it. This kind of meta-information helps to protect information as<br />
any modifications to the information can be detected. If meta-information were to include integrity<br />
protection then users or administrators could for example find all data objects that were modified after<br />
the meta-information was generated. Another possibility would be to establish the trustworthiness of<br />
information by distinguishing between data objects that do or do not have integrity protection<br />
embedded in their meta-information.<br />
Meta-information can also be used for identification purposes. For example meta-information<br />
containing the type, manufacturer, location or capability of a specific hardware sensor deployed in the<br />
field can be used to select certain sensor feeds, i.e. select feeds of all sensors of type audio-sensor,<br />
or select feeds of all sensors that are located within a one-kilometre radius of GPS coordinate with<br />
latitude 50.84064 and longitude 4.35498.<br />
2.3 Possibilities of meta-information in a federated domain<br />
The different types of meta-information discussed in the previous paragraph may also be used in<br />
federated context. Not only to regulate information flows between different domains, but as we shall<br />
see, may have other possibilities too.<br />
Although sharing information may be a main means of NNEC, not all information has to be shared. It<br />
may not be relevant or useful, or it cannot be shared due to limitations other than security. In other<br />
words we must be able to make intelligent decisions on which information is eligible for sharing. For<br />
example one may wish to share a photo but due to bandwidth constraint it is only possible to share it<br />
in a resolution lower than 800x600 pixels. Software may then be used to automatically scale the photo<br />
if it is too large. Another example is to share all recent information objects for which the author is “Jan<br />
de Bruin” because he is one of the planners of an important and complex mission. Many more<br />
examples can be conceived from operational needs, such as: share feeds from sensors from a certain<br />
type like audio only, share images and videos made within a certain range of a GPS location to a<br />
team on a reconnaissance mission or based on keywords selecting which information is sent to such<br />
a mission. Or determine the communication system to use based on an urgency statement in a<br />
document. Depending on the granularity and type of the meta-information the possibilities are virtually<br />
endless.<br />
230