CSAIL logo MIT logo

Accountable Information Usage in Distributed Information Sharing Enviroments Project

Overview

The U.S. Department of Homeland Security (DHS) is committed to using cutting-edge technologies and scientific talent in its quest to make America safer. The DHS Science and Technology Directorate (S& T) is tasked with researching and organizing the scientific, engineering, and technological resources of the United States and leveraging these existing resources into technological tools to help protect the homeland. The Accountable Information Usage in Distributed Information Sharing Environments Project supports this effort through its execution plan.

DHS S& T seeks to leverage the Massachusetts of Institute of Technology (MIT) expertise to enable the homeland security operational environments with innovative processes and technology to implement them within the context of the tactical and policy constraints that currently frame the homeland security challenge.

New tools in information management, visualization, and dissemination provide enormous potential value to decision makers. However, there is no accountable information flow in large-scale, information sharing environments. Recent research suggests that this can be achieved through the novel integration of Semantic Web information-modeling techniques along with Policy Aware Web rules-based access control systems. Advancing this research requires investigation of various options for applying general techniques in accountable systems architectures to an information sharing environment. In Phase I of this project, the research focused on creating proof-of-concept tools to accurately express complex security and privacy policies, reason over them about specific data transactions to determine compliance, and provide justifications for their conclusions [Waterman10Prototyping]. Challenges were also identified that will impede or obstruct implementation of accountable systems in real-world environments in which data is owned by multiple parties and held in disparate, decentralized systems. Phase II will leverage the Phase I research efforts, the expertise of the MIT team, and the continued use of scenario modeling to design proof-of-concept technologies and address the three critical challenges – scale, approximation, and validation & reporting — not readily answerable through existing technology in this project. It will also focus on transitioning the research artifacts into operational environments by integrating existing authentication mechanisms such as Identity Management (IdM) testbed and Federal Public Key Infrastructure (FPKI), which is being developed by the Identity, Credential and Access Management (ICAM) subcommittee, with the policy reasoning tools and leveraging ontologies defined in National Information Exchange Model (NIEM). Infusing our research prototypes with this government supported technology with enable them to take advantages of emerging standards and lead to better interoperability with other tools.

Students

We are interested in working with students at all levels, UROP, MEng or PhD. Students interested in this research should come talk to us.

References



$Date: 2012-07-30 13:05:54 -0400 (Mon, 30 Jul 2012) $