Download presentation
Presentation is loading. Please wait.
Published byFrancis Pearson Modified over 8 years ago
1
Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004
2
Michael C. Daconta March 15, 2004 2 Agenda Where we are Today… What is the DRM? The Information Sharing Imperative Information Sharing Use Case Where is the DRM Going? DRM Working Group Volume Strategy Implementation Profiles Conclusion
3
Michael C. Daconta March 15, 2004 3 Where we are today… Volume 1 is released. http://www.whitehouse.gov/omb/egov/a- 1-fea.html http://www.whitehouse.gov/omb/egov/a- 1-fea.html Agency comments have been collected Send your comments to susan.turnbull@gsa.gov susan.turnbull@gsa.gov We plan on posting comments (without attribution) to a public site. DRM Working Group planning is underway Broad participation including State and Local Address Business and Technical Issues Foster broad adoption and implementation Satisfy the Presidential Orders/Directives
4
Michael C. Daconta March 15, 2004 4 What is the DRM? (1) - Describe Logical Data Modeling. Class, Property, Data Type, Association Goals: Unambiguous! Defined Registered
5
Michael C. Daconta March 15, 2004 5 What is the DRM? (2) - Discover Taxonomy Article at XML.com Context is more than categorization. Business Rules Reification Pragmatics
6
Michael C. Daconta March 15, 2004 6 What is the DRM? (3) - Share XML Messaging, Federated Query, Concepts still evolving… NIEM Announcement - Feb. 28 th : http://it.ojp.gov/topic.jsp?topic_id=188 http://it.ojp.gov/topic.jsp?topic_id=188
7
Michael C. Daconta March 15, 2004 7 The Information Sharing Imperative: EO 13356: Strengthening the Sharing of Terrorism Information to Protect Americans Section 1. Policy: “Agencies shall … give the highest priority to … interchange of terrorism information among between agencies and appropriate authorities of States and local governments [while protecting] the freedom … of Americans….” Section 3. Preparing Terrorism Information for Maximum Distribution within Intelligence Community. IC Agencies shall set forth “standards for sharing of terrorism information by agencies within the Intelligence Community with [through DHS] appropriate authorities of State and local governments.” Section 4. Requirements for Collection of Terrorism Information Inside the United States. Attorney General, Secretary for Homeland Security, and the DCI shall jointly submit their “recommendation on the establishment of executive branch-wide collection and sharing requirements, procedures, and guidelines for terrorism information to be collected within the United States, including, but not limited to, from publicly available sources, including nongovernmental databases. Section 5. Establishment of the Information Systems Council. “The mission of the Council is to plan for and oversee the establishment of an interoperable terrorism information sharing environment to facilitate automated sharing of terrorism information among appropriate agencies….”
8
Michael C. Daconta March 15, 2004 8 DRM Use Case: Information Sharing Description Sharing Context Org 1 Org 2 Data Elems Data Elems Exchange packages Registry COI Context Core Context Components Assembly Discovery
9
Michael C. Daconta March 15, 2004 9 Information Sharing Use Case (1) Markle Report. http://www.markle.org/http://www.markle.org/ “Creating a Trusted Network for Homeland Security” Vignette 3. Scenario: Terrorists planning an attack on Rail lines using Chlorine gas
10
Michael C. Daconta March 15, 2004 10 Information Sharing Use Case (2) Agency X collects data. Using the DRM, Agency X creates metadata that describes this data in an unambiguous manner. Rail Yard Terrorist Organization: + name: “Al Qaeda” Incident + when + where + what + who Zoo Person Chemical Plant Terrorist Terrorist Organization + name Chemical + name Chemical + name: “Chlorine”
11
Michael C. Daconta March 15, 2004 11 Information Sharing Use Case (3) Agency Y needs data to perform analysis. Agency Y discovers Agency X has the data it needs Target Organization Indicators Vulnerability Capability Law Enforcement Law Enforcement Intel Infrastructure Protection Lethal Agent Facility LOB
12
Michael C. Daconta March 15, 2004 12 Information Sharing Use Case (4) Agency Y and Agency X assemble Exchange Packages. Incident Report + who + what + when + where + activity Humint Report Threat Report TargetCapability Police Incident Infrastructure Incident CriticalNon-Critical Chemical Plant Rail YardZoo
13
Michael C. Daconta March 15, 2004 13 Information Sharing Use Case (5) Data is exchanged. CIA Rail Yard Police Dept. Zoo Chemical Plant Infrastructure Protection Intel Law Enforcement Law Enforcement Law Analysis Center Industry Analysis Center States Shared Space DHS Threat Report Incident NCTC DHS
14
Michael C. Daconta March 15, 2004 14 Information Sharing Use Case (6) Data is associated in a shared space. Shared Space Threat Report 1 Capability: Chlorine Gas Target: Rail Lines Incident 2: Police Incident 3: Chemical Incident 1: Zoo Incident 4: Rail Yard
15
Michael C. Daconta March 15, 2004 15 Where is the DRM Going? DRM Working Group Volume Strategy Implementation Profiles
16
Michael C. Daconta March 15, 2004 16 Working Group Structure Three tiers Public participation Virtual “Wiki” Quarterly F2F Forums Team participation Stakeholders, Team Leads/Editors Bi-Weekly Meetings Business Sponsor Group Executive Committee Dispute Resolution Weekly Meetings Public Teams Exec
17
Michael C. Daconta March 15, 2004 17 Volume Strategy (*OFFICIAL*) Change the volume strategy from the current plan by creating cohesive volumes around functional lines. Overview DRM Management Strategy Description Exchange (possibly broadened to Information Sharing) Context Sections in each of the above on Security & Privacy Given broad virtual participation and active Stakeholder involvement, execute the volumes in parallel Implementation Profiles Relational XML Semantic Technologies
18
Michael C. Daconta March 15, 2004 18 Revised DRM Structure Subject Context Security ContextService Context Information Access Data Element Description Resource Description Subject Area Association Query Class Association Resource Class Association Data Property Data Class Unique Identifiers Association Security Class Association Subject Class Association Input/Output Service Class Who What When Where Why Context Information Exchange Exchange Payload Association Exchange Class Sharing Description Structured Semi-Structured Unstructured
19
Michael C. Daconta March 15, 2004 19 XML Profile of the DRM Subject Context Security ContextService Context Information Access Data Element Description Resource Description Who What When Where Why Context Information Exchange Sharing Description Structured Semi-Structured Unstructured XML Topic Map & OWL Lite Web Service Entry (UDDI) IC Information Security Marking “Message” XML Schemas Federated Query & RSS DOD Discovery Medata Spec XML Schema Types XLINK
20
Michael C. Daconta March 15, 2004 20 Conclusion How you can help! http://colab.cim3.net/cgi-bin/wiki.pl?DataReferenceModelhttp://colab.cim3.net/cgi-bin/wiki.pl?DataReferenceModel For stakeholders, we need more editors and contributors! Comment on the DRM Comment on the Success Strategy Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.