Data access and security in a need-to-share environment

Award Information
Agency:
Department of Defense
Branch
Air Force
Amount:
$99,890.00
Award Year:
2009
Program:
SBIR
Phase:
Phase I
Contract:
FA8750-09-C-0102
Agency Tracking Number:
F083-034-0883
Solicitation Year:
2008
Solicitation Topic Code:
AF083-034
Solicitation Number:
2008.3
Small Business Information
Enkia Corporation
817 West Peachtree St., Suite 208, Atlanta, GA, 30308
Hubzone Owned:
N
Socially and Economically Disadvantaged:
N
Woman Owned:
N
Duns:
025167359
Principal Investigator:
Badri Lokanathan
Vice President, Product
(888) 365-4287
blokanathan@enkia.com
Business Contact:
Ashwin Ram
CEO
(888) 365-4287
ashwin@enkia.com
Research Institution:
n/a
Abstract
The adoption of Web 2.0 tools and technologies has enabled new information sharing workflows that are mandated by a need-to-share in government and commercial environments. These workflows introduce new sources of potential information leaks, while the need for securing sensitive information remains critical as ever. Emerging net-centric tools, together with advanced automated cognitive techniques for content analysis and review, can provide users with multi-level security access (read/write) to content strictly in accordance with their level of authorization as governed by organizational policies. An emerging concern with usage of such tools is the security risk of leakage through information aggregation. Allowing lower-level users to discover information in higher-level security domains may provide both existential knowledge and inadvertent leakage through aggregation with other available content that by itself is safe for release. Enkia, a developer of advanced cognitive technologies and tools for monitoring and filtering unstructured text has prototyped SecureBlog as a multi-level content access platform with automated security guards, that supports browse-down and browse-up capabilities. In the proposed Phase I investigation Enkia will develop extensions to SecureBlog that demonstrate the capability of guarding against inadvertent leaks due to aggregation. Subsequently Enkia will extend the developed techniques to browsing multiple web sources. BENEFIT: Information aggregation analysis has two anticipated commercial thrusts. The primary thrust is towards content monitoring and filtering solutions geared towards information security. The secondary commercial thrust is in applications of knowledge discovery.  Examples: correlating separate criminal incidents in law enforcement, chatter monitoring and pattern detection for anti-terrorism applications, locating related case histories in medical or legal fields.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government