Data access and security in a need-to-share environment

Award Information
Agency:
Department of Defense
Amount:
$99,890.00
Program:
SBIR
Contract:
FA8750-09-C-0102
Solitcitation Year:
2008
Solicitation Number:
2008.3
Branch:
Air Force
Award Year:
2009
Phase:
Phase I
Agency Tracking Number:
F083-034-0883
Solicitation Topic Code:
AF083-034
Small Business Information
Enkia Corporation
817 West Peachtree St., Suite 208, Atlanta, GA, 30308
Hubzone Owned:
N
Woman Owned:
N
Socially and Economically Disadvantaged:
N
Duns:
025167359
Principal Investigator
 Badri Lokanathan
 Vice President, Product
 (888) 365-4287
 blokanathan@enkia.com
Business Contact
 Ashwin Ram
Title: CEO
Phone: (888) 365-4287
Email: ashwin@enkia.com
Research Institution
N/A
Abstract
The adoption of Web 2.0 tools and technologies has enabled new information sharing workflows that are mandated by a need-to-share in government and commercial environments. These workflows introduce new sources of potential information leaks, while the need for securing sensitive information remains critical as ever. Emerging net-centric tools, together with advanced automated cognitive techniques for content analysis and review, can provide users with multi-level security access (read/write) to content strictly in accordance with their level of authorization as governed by organizational policies. An emerging concern with usage of such tools is the security risk of leakage through information aggregation. Allowing lower-level users to discover information in higher-level security domains may provide both existential knowledge and inadvertent leakage through aggregation with other available content that by itself is safe for release. Enkia, a developer of advanced cognitive technologies and tools for monitoring and filtering unstructured text has prototyped SecureBlog as a multi-level content access platform with automated security guards, that supports browse-down and browse-up capabilities. In the proposed Phase I investigation Enkia will develop extensions to SecureBlog that demonstrate the capability of guarding against inadvertent leaks due to aggregation. Subsequently Enkia will extend the developed techniques to browsing multiple web sources. BENEFIT: Information aggregation analysis has two anticipated commercial thrusts. The primary thrust is towards content monitoring and filtering solutions geared towards information security. The secondary commercial thrust is in applications of knowledge discovery.  Examples: correlating separate criminal incidents in law enforcement, chatter monitoring and pattern detection for anti-terrorism applications, locating related case histories in medical or legal fields.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government