routing and security theory
Download
Skip this Video
Download Presentation
Routing and Security theory

Loading in 2 Seconds...

play fullscreen
1 / 9

Routing and Security theory - PowerPoint PPT Presentation


  • 43 Views
  • Uploaded on

Routing and Security theory. David E. Ellis. Definitions. The TSG defines the View of objects by message types. There is a hierarchy of Views which will be defined by set theory.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Routing and Security theory' - cynthia-preston


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
definitions
Definitions
  • The TSG defines the View of objects by message types. There is a hierarchy of Views which will be defined by set theory.
  • View + is the wrapping of a View as a EDXL-DE content object. The View+ carries distribution information in EDXL-DE metadata and is acted on by the TSG components.
  • View ++ is the wrapping of an View+ object with a TSG Message Envelope which carries Message Assurance, Stewardship Contracts, Flow Control, distribution tokens and hop limit metadata
slide3

Organization

Context

Subject

Object

Action

Agent

OrganizationalConfiguration of Agent Activity

Define

Role dynamically assumed byOperating Environmentof TSG SPOR agent

Current metadata in View

View+, and View++

define logic
Define logic
  • Define (org, s, o, α, c)
  • if o is member of View (O) where C contains (specific metadata (c) ), then there is a finite set of (a) member actions of Activity (A) where internal configuration of A test true with context (c). When this test is true there are a finite set of (s) members of Role within Organization (O) which can perform Activity (A)
slide5

COI C

COI A

TSG A

View 0

View 0

CAP Msg

CAP Msg

View 0

View 0

View 0

CAP Msg

CAP Msg

View 1

View 1

View 1

EAS Msg

EAS Msg

View 1

View 1

View 2

EAS Msg

EAS Msg

View 2

View 2

HA Msg

HA Msg

View 3

View 2

View 2

WSI Msg

WSI Msg

COI B

COI B

SPOR 1

All Arrows depict “member of” relationship

SPOR 2

slide6

COI A

View 0

CAP Msg

View 0

CAP Msg

View 1

EAS Msg

View 1

EAS Msg

View 2

HA Msg

View 2

WSI Msg

COI B

MSG 1

Public

MSG 2

MSG 3

MSG 4

EAS

MSG 5

MSG 6

MSG 7

MSG 8

STATE

MSG 9

delivery policies
Delivery Policies
  • COI A and COI B are counties in different states and have specific internal locations for distributing CAP alert & warning Msg.
  • COI B is in a state where the State EOC is only authority to send out a EAS Msg.
  • Each COI creates CAP message which activates unique EAS system.
  • Keywords are used to determine routing policies which apply to the message.
issues to be resolved
Issues to be resolved
  • Granularity of CAP Message typing for internal COI versus external distribution
  • When can a CAP message use all possible typing for distribution purposes
  • Where are these types inserted in the EDXL-DE messages.
  • When does a distribution policy preclude the Member_of Keyword use
  • When does use of CAP headline not clarify as an Alert & Warning message
slide9

UnrestrictedContent

State EOC

DHS

CDC

County EOC

StateHealthDept

County Health Department

RestrictedContent

ad