Data access and security in a need-to-share environment

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8750-09-C-0102
Agency Tracking Number: F083-034-0883
Amount: $99,890.00
Phase: Phase I
Program: SBIR
Awards Year: 2009
Solicitation Year: 2008
Solicitation Topic Code: AF083-034
Solicitation Number: 2008.3
Small Business Information
817 West Peachtree St., Suite 208, Atlanta, GA, 30308
DUNS: 025167359
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Badri Lokanathan
 Vice President, Product
 (888) 365-4287
Business Contact
 Ashwin Ram
Title: CEO
Phone: (888) 365-4287
Research Institution
The adoption of Web 2.0 tools and technologies has enabled new information sharing workflows that are mandated by a need-to-share in government and commercial environments. These workflows introduce new sources of potential information leaks, while the need for securing sensitive information remains critical as ever. Emerging net-centric tools, together with advanced automated cognitive techniques for content analysis and review, can provide users with multi-level security access (read/write) to content strictly in accordance with their level of authorization as governed by organizational policies. An emerging concern with usage of such tools is the security risk of leakage through information aggregation. Allowing lower-level users to discover information in higher-level security domains may provide both existential knowledge and inadvertent leakage through aggregation with other available content that by itself is safe for release. Enkia, a developer of advanced cognitive technologies and tools for monitoring and filtering unstructured text has prototyped SecureBlog as a multi-level content access platform with automated security guards, that supports browse-down and browse-up capabilities. In the proposed Phase I investigation Enkia will develop extensions to SecureBlog that demonstrate the capability of guarding against inadvertent leaks due to aggregation. Subsequently Enkia will extend the developed techniques to browsing multiple web sources. BENEFIT: Information aggregation analysis has two anticipated commercial thrusts. The primary thrust is towards content monitoring and filtering solutions geared towards information security. The secondary commercial thrust is in applications of knowledge discovery.  Examples: correlating separate criminal incidents in law enforcement, chatter monitoring and pattern detection for anti-terrorism applications, locating related case histories in medical or legal fields.

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government