27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Harm Schotanus et al.<br />

facilitates the publication of descriptions of (multiple) resources. The goal of the POWDER working<br />

group has been to develop a mechanism that allows not only the provision of descriptions but also a<br />

way to apply them to groups of (online) resources and for the authentication of those descriptions in<br />

relation to establishing a trust level of those descriptions.<br />

2.2 Possibilities of meta-information within a single network<br />

2.2.1 Information Lifecycle Management<br />

Information Lifecycle Management is about the different lifecycle phases that information can go<br />

through, from the creation of information, via different manipulations or updates to the deletion of<br />

information or at least archiving the information for future reference. Easy accessible meta-information<br />

can facilitate Information Lifecycle Management and create new possibilities. For example, with more<br />

meta-information available, information objects could also be archived for different reasons. For<br />

example archive every file that was created by ‘Danielle Zeeg’ because she no longer works at the<br />

company or archive every information object that has been tagged as ‘SFOR’ because that mission<br />

has ended.<br />

Similar to the archiving scenario aiding users or administrators in searching for information can also<br />

benefit from having more meta-information available. For instance search all information objects that<br />

carry file extension ‘pdf’ and are created in 2010 and have been authored by ‘Kees de Witte’ and have<br />

been tagged with ‘SFOR’.<br />

2.2.2 Integrity protection<br />

It is also possible to embed integrity protection capabilities in meta-information. For example by<br />

creating a digital signature of the information, the signature can later be used to verify information has<br />

been changed or validate who created it. This kind of meta-information helps to protect information as<br />

any modifications to the information can be detected. If meta-information were to include integrity<br />

protection then users or administrators could for example find all data objects that were modified after<br />

the meta-information was generated. Another possibility would be to establish the trustworthiness of<br />

information by distinguishing between data objects that do or do not have integrity protection<br />

embedded in their meta-information.<br />

Meta-information can also be used for identification purposes. For example meta-information<br />

containing the type, manufacturer, location or capability of a specific hardware sensor deployed in the<br />

field can be used to select certain sensor feeds, i.e. select feeds of all sensors of type audio-sensor,<br />

or select feeds of all sensors that are located within a one-kilometre radius of GPS coordinate with<br />

latitude 50.84064 and longitude 4.35498.<br />

2.3 Possibilities of meta-information in a federated domain<br />

The different types of meta-information discussed in the previous paragraph may also be used in<br />

federated context. Not only to regulate information flows between different domains, but as we shall<br />

see, may have other possibilities too.<br />

Although sharing information may be a main means of NNEC, not all information has to be shared. It<br />

may not be relevant or useful, or it cannot be shared due to limitations other than security. In other<br />

words we must be able to make intelligent decisions on which information is eligible for sharing. For<br />

example one may wish to share a photo but due to bandwidth constraint it is only possible to share it<br />

in a resolution lower than 800x600 pixels. Software may then be used to automatically scale the photo<br />

if it is too large. Another example is to share all recent information objects for which the author is “Jan<br />

de Bruin” because he is one of the planners of an important and complex mission. Many more<br />

examples can be conceived from operational needs, such as: share feeds from sensors from a certain<br />

type like audio only, share images and videos made within a certain range of a GPS location to a<br />

team on a reconnaissance mission or based on keywords selecting which information is sent to such<br />

a mission. Or determine the communication system to use based on an urgency statement in a<br />

document. Depending on the granularity and type of the meta-information the possibilities are virtually<br />

endless.<br />

230

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!