Presentation is loading. Please wait.

Presentation is loading. Please wait.

Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004.

Similar presentations


Presentation on theme: "Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004."— Presentation transcript:

1 Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004

2 Michael C. Daconta March 15, 2004 2 Agenda  Where we are Today…  What is the DRM?  The Information Sharing Imperative  Information Sharing Use Case  Where is the DRM Going?  DRM Working Group  Volume Strategy  Implementation Profiles  Conclusion

3 Michael C. Daconta March 15, 2004 3 Where we are today…  Volume 1 is released.  http://www.whitehouse.gov/omb/egov/a- 1-fea.html http://www.whitehouse.gov/omb/egov/a- 1-fea.html  Agency comments have been collected  Send your comments to susan.turnbull@gsa.gov susan.turnbull@gsa.gov  We plan on posting comments (without attribution) to a public site.  DRM Working Group planning is underway  Broad participation including State and Local  Address Business and Technical Issues  Foster broad adoption and implementation  Satisfy the Presidential Orders/Directives

4 Michael C. Daconta March 15, 2004 4 What is the DRM? (1) - Describe  Logical Data Modeling.  Class, Property, Data Type, Association  Goals:  Unambiguous!  Defined  Registered

5 Michael C. Daconta March 15, 2004 5 What is the DRM? (2) - Discover  Taxonomy  Article at XML.com  Context is more than categorization.  Business Rules  Reification  Pragmatics

6 Michael C. Daconta March 15, 2004 6 What is the DRM? (3) - Share  XML Messaging, Federated Query, Concepts still evolving…  NIEM Announcement - Feb. 28 th : http://it.ojp.gov/topic.jsp?topic_id=188 http://it.ojp.gov/topic.jsp?topic_id=188

7 Michael C. Daconta March 15, 2004 7 The Information Sharing Imperative: EO 13356: Strengthening the Sharing of Terrorism Information to Protect Americans  Section 1. Policy: “Agencies shall … give the highest priority to … interchange of terrorism information among between agencies and appropriate authorities of States and local governments [while protecting] the freedom … of Americans….”  Section 3. Preparing Terrorism Information for Maximum Distribution within Intelligence Community. IC Agencies shall set forth “standards for sharing of terrorism information by agencies within the Intelligence Community with [through DHS] appropriate authorities of State and local governments.”  Section 4. Requirements for Collection of Terrorism Information Inside the United States. Attorney General, Secretary for Homeland Security, and the DCI shall jointly submit their “recommendation on the establishment of executive branch-wide collection and sharing requirements, procedures, and guidelines for terrorism information to be collected within the United States, including, but not limited to, from publicly available sources, including nongovernmental databases.  Section 5. Establishment of the Information Systems Council. “The mission of the Council is to plan for and oversee the establishment of an interoperable terrorism information sharing environment to facilitate automated sharing of terrorism information among appropriate agencies….”

8 Michael C. Daconta March 15, 2004 8 DRM Use Case: Information Sharing Description Sharing Context Org 1 Org 2 Data Elems Data Elems Exchange packages Registry COI Context Core Context Components Assembly Discovery

9 Michael C. Daconta March 15, 2004 9 Information Sharing Use Case (1)  Markle Report. http://www.markle.org/http://www.markle.org/  “Creating a Trusted Network for Homeland Security”  Vignette 3.  Scenario: Terrorists planning an attack on Rail lines using Chlorine gas

10 Michael C. Daconta March 15, 2004 10 Information Sharing Use Case (2)  Agency X collects data.  Using the DRM, Agency X creates metadata that describes this data in an unambiguous manner. Rail Yard Terrorist Organization: + name: “Al Qaeda” Incident + when + where + what + who Zoo Person Chemical Plant Terrorist Terrorist Organization + name Chemical + name Chemical + name: “Chlorine”

11 Michael C. Daconta March 15, 2004 11 Information Sharing Use Case (3)  Agency Y needs data to perform analysis.  Agency Y discovers Agency X has the data it needs Target Organization Indicators Vulnerability Capability Law Enforcement Law Enforcement Intel Infrastructure Protection Lethal Agent Facility LOB

12 Michael C. Daconta March 15, 2004 12 Information Sharing Use Case (4)  Agency Y and Agency X assemble Exchange Packages. Incident Report + who + what + when + where + activity Humint Report Threat Report TargetCapability Police Incident Infrastructure Incident CriticalNon-Critical Chemical Plant Rail YardZoo

13 Michael C. Daconta March 15, 2004 13 Information Sharing Use Case (5)  Data is exchanged. CIA Rail Yard Police Dept. Zoo Chemical Plant Infrastructure Protection Intel Law Enforcement Law Enforcement Law Analysis Center Industry Analysis Center States Shared Space DHS Threat Report Incident NCTC DHS

14 Michael C. Daconta March 15, 2004 14 Information Sharing Use Case (6)  Data is associated in a shared space. Shared Space Threat Report 1 Capability: Chlorine Gas Target: Rail Lines Incident 2: Police Incident 3: Chemical Incident 1: Zoo Incident 4: Rail Yard

15 Michael C. Daconta March 15, 2004 15 Where is the DRM Going?  DRM Working Group  Volume Strategy  Implementation Profiles

16 Michael C. Daconta March 15, 2004 16 Working Group Structure  Three tiers  Public participation  Virtual  “Wiki”  Quarterly F2F Forums  Team participation  Stakeholders, Team Leads/Editors  Bi-Weekly Meetings  Business Sponsor Group  Executive Committee  Dispute Resolution  Weekly Meetings Public Teams Exec

17 Michael C. Daconta March 15, 2004 17 Volume Strategy (*OFFICIAL*)  Change the volume strategy from the current plan by creating cohesive volumes around functional lines.  Overview  DRM Management Strategy  Description  Exchange (possibly broadened to Information Sharing)  Context  Sections in each of the above on Security & Privacy  Given broad virtual participation and active Stakeholder involvement, execute the volumes in parallel  Implementation Profiles  Relational  XML  Semantic Technologies

18 Michael C. Daconta March 15, 2004 18 Revised DRM Structure Subject Context Security ContextService Context Information Access Data Element Description Resource Description Subject Area Association Query Class Association Resource Class Association Data Property Data Class Unique Identifiers Association Security Class Association Subject Class Association Input/Output Service Class Who What When Where Why Context Information Exchange Exchange Payload Association Exchange Class Sharing Description Structured Semi-Structured Unstructured

19 Michael C. Daconta March 15, 2004 19 XML Profile of the DRM Subject Context Security ContextService Context Information Access Data Element Description Resource Description Who What When Where Why Context Information Exchange Sharing Description Structured Semi-Structured Unstructured XML Topic Map & OWL Lite Web Service Entry (UDDI) IC Information Security Marking “Message” XML Schemas Federated Query & RSS DOD Discovery Medata Spec XML Schema Types XLINK

20 Michael C. Daconta March 15, 2004 20 Conclusion  How you can help!  http://colab.cim3.net/cgi-bin/wiki.pl?DataReferenceModelhttp://colab.cim3.net/cgi-bin/wiki.pl?DataReferenceModel  For stakeholders, we need more editors and contributors!  Comment on the DRM  Comment on the Success Strategy  Questions?

21


Download ppt "Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004."

Similar presentations


Ads by Google