Information Assurance for Real-Time Decision Support

Information is an important element in all decision making processes. Also, the quality of information has to be assured in order to support proper decision making in critical systems. In this paper, we present a comprehensive solution to information assurance. First we develop an ontology of information quality metrics, which can be used in assessment as well as in guiding the information processing procedures. To achieve proper information quality assessment, it is necessary to track the information flow as well as detect anomalous information processing flaws. We leverage existing data provenance and anomaly detection technologies and improve them to achieve real-time information quality assessment and problem detection.

[1]  R. P. Jagadeesh Chandra Bose,et al.  Data mining approaches to software fault diagnosis , 2005, 15th International Workshop on Research Issues in Data Engineering: Stream Data Mining and Applications (RIDE-SDMA'05).

[2]  Farokh B. Bastani,et al.  QoS-Reconfigurable Web Services and Compositions for High-Assurance Systems , 2008, Computer.

[3]  Farokh B. Bastani,et al.  Trustworthiness Assessment Framework for Net-Centric Systems , 2009 .

[4]  Pierangela Samarati,et al.  Providing Security and Interoperation of Heterogeneous Systems , 2004, Distributed and Parallel Databases.

[5]  Srinivasan Raghunathan,et al.  Impact of information quality and decision-maker quality on decision quality: a theoretical model and simulation analysis , 1999, Decis. Support Syst..

[6]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[7]  Elisa Bertino,et al.  Secure collaboration in mediator-free environments , 2005, CCS '05.

[8]  Farokh B. Bastani,et al.  Systematic incorporation of efficient fault tolerance in systems of cooperating parallel programs , 1994, Proceedings of IEEE 24th International Symposium on Fault- Tolerant Computing.

[9]  Farokh B. Bastani,et al.  Toward QoS analysis of adaptive service-oriented architecture , 2005, IEEE International Workshop on Service-Oriented System Engineering (SOSE'05).

[10]  Farokh B. Bastani,et al.  A model and methodology for composition QoS analysis of embedded systems , 2005, 11th IEEE Real Time and Embedded Technology and Applications Symposium.

[11]  Bhavani M. Thuraisingham,et al.  Role-based integrated access control and data provenance for SOA based net-centric systems , 2011, Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE).

[12]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[13]  Cláudio T. Silva,et al.  Provenance for Computational Tasks: A Survey , 2008, Computing in Science & Engineering.

[14]  Elisa Bertino,et al.  Secure interoperation in a multidomain environment employing RBAC policies , 2005, IEEE Transactions on Knowledge and Data Engineering.

[15]  Raymond A. Paul,et al.  Data provenance in SOA: security, reliability, and integrity , 2007, Service Oriented Computing and Applications.