1 / 9

Routing and Security theory

Routing and Security theory. David E. Ellis. Definitions. The TSG defines the View of objects by message types. There is a hierarchy of Views which will be defined by set theory.

nia
Download Presentation

Routing and Security theory

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Routing and Security theory David E. Ellis

  2. Definitions • The TSG defines the View of objects by message types. There is a hierarchy of Views which will be defined by set theory. • View + is the wrapping of a View as a EDXL-DE content object. The View+ carries distribution information in EDXL-DE metadata and is acted on by the TSG components. • View ++ is the wrapping of an View+ object with a TSG Message Envelope which carries Message Assurance, Stewardship Contracts, Flow Control, distribution tokens and hop limit metadata

  3. Organization Context Subject Object Action Agent OrganizationalConfiguration of Agent Activity Define Role dynamically assumed byOperating Environmentof TSG SPOR agent Current metadata in View View+, and View++

  4. Define logic • Define (org, s, o, α, c) • if o is member of View (O) where C contains (specific metadata (c) ), then there is a finite set of (a) member actions of Activity (A) where internal configuration of A test true with context (c). When this test is true there are a finite set of (s) members of Role within Organization (O) which can perform Activity (A)

  5. COI C COI A TSG A View 0 View 0 CAP Msg CAP Msg View 0 View 0 View 0 CAP Msg CAP Msg View 1 View 1 View 1 EAS Msg EAS Msg View 1 View 1 View 2 EAS Msg EAS Msg View 2 View 2 HA Msg HA Msg View 3 View 2 View 2 WSI Msg WSI Msg COI B COI B SPOR 1 All Arrows depict “member of” relationship SPOR 2

  6. COI A View 0 CAP Msg View 0 CAP Msg View 1 EAS Msg View 1 EAS Msg View 2 HA Msg View 2 WSI Msg COI B MSG 1 Public MSG 2 MSG 3 MSG 4 EAS MSG 5 MSG 6 MSG 7 MSG 8 STATE MSG 9

  7. Delivery Policies • COI A and COI B are counties in different states and have specific internal locations for distributing CAP alert & warning Msg. • COI B is in a state where the State EOC is only authority to send out a EAS Msg. • Each COI creates CAP message which activates unique EAS system. • Keywords are used to determine routing policies which apply to the message.

  8. Issues to be resolved • Granularity of CAP Message typing for internal COI versus external distribution • When can a CAP message use all possible typing for distribution purposes • Where are these types inserted in the EDXL-DE messages. • When does a distribution policy preclude the Member_of Keyword use • When does use of CAP headline not clarify as an Alert & Warning message

  9. UnrestrictedContent State EOC DHS CDC County EOC StateHealthDept County Health Department RestrictedContent

More Related