You are on page 1of 20

A Reference Model for Information Management to Support

Coalition Information Sharing Needs

Mark Linderman (POC) Sue Haines


Air Force Research Laboratory DSTL Information Management
Information Directorate Malvern Technology Centre
525 Brooks Road Rome, NY 13441-4505 St Andrews Road
mark.linderman@rl.af.mil Malvern Worcs WR14 3PS UK
slhaines@dstl.gov.uk
Barry Siegel
SPAWAR Systems Center - San Diego, Code 2461 Greg Chase
53560 Hull St. San Diego, CA 92152-5000 Command & Control Division
barry.siegel@navy.mil Defence Science and Technology Organisation
PO Box 1500 Edinburgh
David Ouellet South Australia 5111
Defence Research and Development Canada - greg.chase@dsto.defence.gov.au
Valcartier
2459 Pie-XI Blvd North Janet O’May
Val-Belair, Quebec, Canada G3J 1X5 U.S. Army Research Laboratory
david.ouellet@drdc-rddc.gc.ca ATTN: AMSRD-ARL-CI-CT
Aberdeen Proving Ground, MD 21005-5067
Julie Brichacek janet.omay@us.army.mil
Air Force Research Laboratory
Information Directorate
525 Brooks Rd Rome, NY 13441-4505
julie.brichacek@rl.af.mil

This document contains Information authorized under the auspices of The Technical Cooperation Program (TTCP)
for unlimited release and distribution.

ABSTRACT

Effective information management is a key enabler in ensuring that commanders have access to the information they
need to make optimal decisions. This can only be achieved by the combination of people, processes and tools to
form an effective system. Many systems and technologies claim to address the information management problem.
However, in the absence of a universally accepted model of information management, it is hard to assess how well
these products and systems support military information management requirements. Simply stating that information
management is the capability to provide the right information, in the right place, and at the right time, does not
provide a yard stick against which to measure a system’s capability. The Technical Cooperation Program (TTCP)
Command, Control, Communications and Information (C3I) Action Group (AG) 4 has taken on the challenge of
defining a model of information management to support command and control (C2) in a coalition context. The
proposed model provides an abstract representation of the important elements that are required to form an effective
information management system. This has been validated by the examination of tools that support information
management and the model’s coverage of their capabilities.

1 of 19
Form Approved
Report Documentation Page OMB No. 0704-0188

Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington
VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it
does not display a currently valid OMB control number.

1. REPORT DATE 3. DATES COVERED


2. REPORT TYPE
JUN 2005 00-00-2005 to 00-00-2005
4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER
A Reference Model for Information Management to Support Coalition 5b. GRANT NUMBER
Information Sharing Needs
5c. PROGRAM ELEMENT NUMBER

6. AUTHOR(S) 5d. PROJECT NUMBER

5e. TASK NUMBER

5f. WORK UNIT NUMBER

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION


REPORT NUMBER
Air Force Research Laboratory,Information Directorate,525 Brooks
Road,Rome,NY,13441-4505
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S)

11. SPONSOR/MONITOR’S REPORT


NUMBER(S)

12. DISTRIBUTION/AVAILABILITY STATEMENT


Approved for public release; distribution unlimited
13. SUPPLEMENTARY NOTES
The original document contains color images.
14. ABSTRACT

15. SUBJECT TERMS

16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF
ABSTRACT OF PAGES RESPONSIBLE PERSON
a. REPORT b. ABSTRACT c. THIS PAGE
19
unclassified unclassified unclassified

Standard Form 298 (Rev. 8-98)


Prescribed by ANSI Std Z39-18
information and other facets that are significant.
1. INTRODUCTION
Others3 refer to the “treatment” or “skillful handling”
The goal of Information Management is to maximize of information. While not inaccurate, these terms are
the effectiveness of an enterprise (e.g., military too vague for the purposes of defining a model of
operations) by maximizing its ability to act upon information management that is technical in nature.
information that is produced and consumed within We define information management as a set of
the enterprise and externally. There are several intentional activities to maximize the value of
means by which this can be accomplished: information to support the objectives of the
enterprise. These activities include the promulgation
• Reducing barriers to effective information use by of standards, control of information and the
providing notification, mediation, access control, administrative activities that support it, and the
and persistence services capture, dissemination, manipulation, persistence and
• Providing an information space wherein destruction of information. The goal of this paper is
information is managed directly, rather than to describe these activities and the actors that perform
delegating all information management them or are affected by them.
responsibilities to applications that produce and
consume information There are several aspects of this definition that bear
• Focusing on consumer needs rather than upon the structure of the information management
producer preferences to ensure that information model (discussed in Section 2). The first is the word
can be effectively used “activities.” Managing is not an end state or a frame
• Providing tools to assess information quality and of mind, it is something one does. Therefore, the
suitability of information model enumerates and describes these activities that
• Exploit producer-provided characterization of comprise the verbs of management. Implicit in the
information to support automated management definition are actors that interact with the managed
of information. information environment by either managing
information or by sharing managed information.
There are many definitions of information Finally, there is the information itself that, together
management extant, many of which apply generic with the actors, comprise the nouns of information
management terms to the information domain. An management.
example is OMB Circular A-1301 that defines The next word that bears scrutiny is “intentional.”
information management as “the planning, budgeting, Arguably, one might consider unintentional (de facto)
manipulating, and controlling of information activities, but we emphasize intention precisely
throughout its life cycle.” Our TTCP2 action group’s because there appears to be a prevalent attitude that
interest is in defining a model of information information management is “everywhere and
management that is technical in nature, and therefore nowhere.” Our premise is that enterprises are not
we will not focus on the planning and budgeting maximizing the value of the information they possess
concerns, but rather on manipulation and control of because either 1) information management is viewed
as “someone else’s” responsibility, or 2) it is
1
http://www.whitehouse.gov/omb/circulars/a130/a13 delegated down to individuals or organizations
0trans4.html without sufficient authority or resources to perform it
2
“TTCP is an international organization that effectively.
collaborates in defence scientific and technical Information management is a “set” of intentional
information exchange; program harmonization and activities that act in concert with one another to
alignment; and shared research activities for the five achieve a desired result. If these activities operate
nations, Australia, Canada, New Zealand, the United independently of one another, the results may be
Kingdom, and the United States. The Command, minimally acceptable but far short of optimal. For
Control, Communications and Information Systems example, access control and information
(C3I) Group is responsible for co-operative and transformation may act together to sanitize
collaborative development of technologies to achieve information in accordance with disclosure policies
interoperable, seamless information systems focused prior to sharing it with a given consumer. Acting
on the support of allied military missions.” Under the independently, the access control activity may be
C3I Group, the charter of the Information forced to decide between passing all or none of an
Management action group AG-4 is to examine the object. Therefore, passing nothing might adhere to
area of information management at the strategic,
operational and tactical levels within a coalition 3
www.impact21group.com/glossary.htm,
force.
lorien.ncl.ac.uk/ming/cleantech/glossary.htm

2 of 19
the prevailing security policy, but operational In a coalition context, there are several implications
effectiveness may suffer because finer-grained of information management that we assume to hold.
enforcement is not an option. These assumptions are:
The definition explicitly states that information role 1. Acquisition cannot be standardized or
is to support the enterprise. Information seldom has a synchronized. Perhaps a stronger statement of
value in itself; rather, it is a tool to achieve other this is that acquisition should not be
things. Therefore, the value of information is not an standardized or synchronized, if the result of
intrinsic quality, but dependent upon how it is used. doing so is inability to interact with new
To effectively perform value-based management, the coalition partners, unacceptable delays in
managers and perhaps the infrastructure must be able fielding capabilities, or unacceptably high costs
to estimate the value of information. To do this, it is for fielding or supporting capabilities.
important to understand the business processes 2. Universal data standards are unrealistic. While
supported by that information and the relative progress can certainly be made on broad
importance of those processes. Ultimately, it is agreements of both high level data standards
desirable to prioritize resource allocation at a high (e.g., standard upper-order ontologies) and
level, perhaps at the process level, and have the within domains (e.g., Command and Control
priorities of lower-level objects (e.g., supporting Information Exchange Data Model (C2IEDM)),
information) be automatically derived from it. This insistence upon a single, universal model is
is an example of management granularity that has a counterproductive.
direct impact upon the effort required to manage. 3. Data standards version skew is the norm not the
exception. While this assumption is primarily a
The information management model presented
by-product of asynchronous acquisition, it is
(Figure 1) is an abstract representation of the
worth explicitly noting because it has specific
essential activities of information management and
implications on the information management
the actors that interact within an information
environment for coalition operations. If we
environment to achieve their objectives. The purpose
assume that different participants will migrate
of the model is to lift the quality of dialog about
to newer standards at different rates, then it is
information management from generalizations and
incumbent upon information managers to deal
vaguely stated capabilities to thoughtful
with the problem.
consideration of specific activities and appropriate
4. Coalition Information Space must adapt quickly
assignment of resources, roles and responsibilities.
to new partners and processes. Similar to
Perhaps most importantly, we hope to convey that
assumption 3, this assumption affects where
information management should be an enterprise-
adaptation is likely to take place. Given current
level challenge; one that is too important to ignore or
software technology, especially as seen in
relegate to users that are insufficiently resourced,
complex military applications, it is unrealistic
lacking authority, or lacking appreciation of
to assume that applications will be able to adapt
enterprise-level objectives.
to changing processes, products or partners.
We recognize that any information management Today adaptation is carried out by changing the
model needs to include the following critical behaviour of people; often through patchwork
elements: people and their roles; processes; and fixes and workarounds. From an information
implementation technologies. Our model is equally management perspective, this situation can be
applicable to a range of ‘systems’, from manual ameliorated by providing managed information
information exchange processes to wholly automated tailoring environments and tools to support
systems. An information management system, which processes that can be modified by policy rather
implements this model can be constructed from a than with software that cannot.
range of technologies and the model itself should not
be seen as a constraining process that mandates a In short, we must learn to accommodate diversity in
particular architectural style e.g., publish and mission, motivation, technical infrastructure, and
subscribe architectures, or service oriented allegiance and culture. To a large extent, an
architectures. Rather it should be regarded as information management environment, which forms
identifying the information management a bridge between the participants in a coalition
requirements that would need to be supported by operation, provides an ideal place to accommodate
these architectures in order to provide an effective diversity. It provides one place in an information
information management capability. architecture where changes should be made. With
this in mind, it is essential that our information

3 of 19
management environments be designed with it. They need a characterization of the information.
adaptability in mind. For example, if a movie clip shows a car chase, the
managers do not need to have a detailed description
2. A MODEL OF INFORMATION of each frame; it may be enough to know that the
MANAGEMENT topic is a car chase, and that it occurred at a given
time and location. Furthermore, given the volume of
The model describes actors that interact with one information a typical enterprise uses, it is important
another through the information space, the
that the characterization be readily available.
information management infrastructures that
comprise an information space, and the layers of Because we are interested in the management of
services that perform the activities of information information, we need to define more formally what
management. Actors interact with the information these objects are. The quantum of managed
management infrastructure by producing and information is called a managed information object
consuming information or by managing it. External (MIO). A MIO comprises a payload (e.g., the movie
information spaces that interact with a given space clip in the example above) and metadata that
are also actors from the perspective of the space. The characterizes the object (e.g., topic, time, and
information space is a collection of information location). It is desirable that all of the information
catalogues and repositories that form the heart of an needed for making management decisions (such as
information management infrastructure. A service content-based dissemination) be present in the
within a layer performs a specific information metadata in a form that permits efficient processing.
management activity. An artifact is a piece of While there may be cases where this is not possible
information (e.g., a managed information object) that (e.g., payload inspection for virus detection), the
is acted upon by a service or that influences the degree to which it holds may have a direct bearing
behaviour of the service (e.g., a policy). We begin by upon the efficiency of management. An important
describing the salient features of managed element of characterization is the concept of type.
information and then describe the three components The type of an object (e.g., “satellite imagery”) is
that comprise the model: actors, service layers and useful for determining how the information should be
the information space. Another model4 of characterized and for setting policy on its appropriate
information management served as a departure point use.
for the model we present. Our model differs in that it
2.2. Actors
• Makes are clear distinction between actors and The information management model depicts a set of
the services they employ; actors who interact with the information
• Addresses federates to support diverse infrastructure and are known as consumers,
communities (such as coalitions); producers, federated spaces (collectively referred to
• Organizes activities according to type of service as “federates”), and managers. Depending on their
(i.e., service layer) rather than by process steps role, these actors will consume or produce
(e.g., task, submit, consume) information, or will manage the infrastructure. A
• Is more explicit on maintenance and security description of the mechanisms and products that each
activities, and significantly enhances actor will either generate or require in order for
transformation services; and information management system to operate
• Supports flexible workflow rather than imply a effectively follows.
specific information process through which all
information must pass from production to 2.2.1. Consumers
consumption.
Consumers are information space clients that utilize
2.1. Managed Information Objects the information within the information space. A
Informal words, such as “document” and “object”, consumer requests information from the information
are often used to describe a quantum of information. space by presenting their security credentials and
In a sense, the managers of information and transaction request. Within a transaction request, the
information management infrastructures only want to consumer describes details such as the type of
know enough about a quantum of information to do information, search criteria, subscription criteria,
their jobs; they do not need to know everything about prioritization of returned results, format for
information to be returned in, and length of
subscription. Consumer’s transaction requests are
4
Information Management Capability Development typically filled by the information space from either
Roadmap (IMCDR), Mike Farrington, March 2004 -
QINETIQ/KI/IntSys/PUB040917

4 of 19
Figure 1. Information Management Model
the information catalogue and/or information Subscribe: Consumers want to be notified of new or
repositories. The types of transactions a consumer updated information as it becomes available.
may want are the ability to browse, query, subscribe, Subscription requests form a part of the Information
transform and assess suitability of information within Catalogue. A request states what information is
the information space. required and for how long the subscription should be
fulfilled by the brokering layer. The brokering layer
Search/Browse: Consumers browse the information
should support the capability of accepting, setting
space if they want to see what is currently contained
and fulfilling subscriptions. Once the brokering layer
in the information space. Browsing includes the
accepts a subscription, notification of MIOs that meet
ability to search and receive information from the
subscription’s criteria should be sent as they become
information space and is supported by the brokering
available.
layer. The brokering layer should support several
modes of search, including simple keyword searches Query: Consumers query the information space to
similar to Google™. A search returns to the retrieve previously published information. A query is
consumer links to available MIOs that meet the more structured than searching in that the search
search criteria. Search and browse are less criteria are expressed in predicates based upon the
structured, both in the predicate language and the structure (and potentially semantics) of MIO
process, then subscription and query (defined next). metadata. The brokerage layer fulfils queries by
retrieving either a partial or full set of MIOs.

5 of 19
Transform: Consumers will want the ability to filter particularly sensitive nature, where the provider is
information, set prioritization of received results and unwilling to delegate access control decisions to the
have information reformatted to their specific information space, the provider may opt to publish
operating environment. These types of user-defined only the metadata together with a pointer to the
manipulations are set by users, sent to the information directly held by the provider. This
information space as part of browse, query or method of publication into the space may also be
subscribe and then performed on the resultant used for ‘oversized’ information items or access to
information by the transformation layer. An real-time data feeds.
information space that supports user-defined
Advertise: Producers may describe products that it
manipulation of information will allow for processing
could (if requested) produce. For example a given
of the information retrieved from the space prior to
producer may have the capability to obtain an aerial
presentation to the consumer.
image of a given place. The advertisement of the
Suitability, Assessment, and Feedback: Consumers capability should include a description of the
should perform suitability assessments and provide available product, possibly constructed from a
feedback on the information that has been received collection of metadata or through the use of an agreed
from the information space. Today, assessment is ontology. This advertisement should also provide the
typically a manual process carried out by users, based client with information that can enable it to invoke
upon experience, that rates information in terms of its any processes, external to the information space, that
fitness for the user’s needs. In some instances some are required for the producer to provide such
elements of the assessment process can be delegated capability.
to the consumer process acting on the user’s behalf,
Receive Consumer Feedback: Producers may be
for example, where initial assessment can be made
able to offer a better service to consumers if they
based upon previous user preferences or ratings.
receive some feedback from the information space.
Consumer feedback should be provided to the
This feedback should, at a minimum, provide
information space so that managers can collect,
retrieval statistics for the information produced by the
sanitize, and then send feedback to the specified
producer, and could provide qualitative feedback on
producers. A consumer may submit a Request For
the relevance of the information supplied to the
Information (RFI) if its requirements are not being
consumers needs. For example, consumers might
met.
indicate that the granularity of the information
supplied should be improved, suggest an alternative
2.2.2. Producers
format for the information, highlight the need for
Producers are information space clients that add supply of information relating to a different
information to the information space. The geographic location, or request that information be
information will reside in the persistent or transient packaged into smaller chunks.
information repositories, depending on the
requirements. In most cases the producer client will Receive Targeted Requests for Information:
have created this information via some other process, Producers may receive targeted requests for
for example a remote sensing system. In some cases a information, based upon RFIs (which may be related
consumer client may recover information from the to the advertised capabilities of the information
repository, add value via some algorithm, and then producer). The receipt of an RFI may trigger the
add processed information back to the repository. collection and subsequent publication of relevant,
Such a client is both a producer and a consumer. The characterized information. RFIs may also be used by
functions of a producer are to publish information, the information producer to guide their future
advertise capabilities, process feedback from production priorities.
consumers, receive requests for information, and Retraction of Published Information: A producer
remove incorrect information. may need to retract information that is later deemed
Publish: A producer’s primary interaction with an to be incorrect. This retraction should not remove the
information space is publication of information. For information from the repository (as it was actually
published information to be effectively managed, the published and available to decision makers at some
producer needs to characterize the information point in time) but instead mark the information as
published, using terms that can be interpreted by both “retracted”.
the managers of the information space and
consumers. At a minimum, this characterization 2.2.3. Federates
should include the time of publication and the The ideal of a single, universal information space is
identity of the publisher. For products of a unlikely to be achieved in any sufficiently complex

6 of 19
military or commercial endeavour, such as in Federates are outside information spaces and, by
coalition operations. Wherever it is necessary to extension, so are their managers and the clients they
have multiple information spaces, it is likely that serve. In this regard, federates are like producers and
clients will want to reach across them to get the consumers, except that as ‘outsiders,’ there are likely
information they need. There are two non-mutually to be more restrictions on interactions with them. As
exclusive methods of interaction that may be ‘external’ actors, they do not have control over the
employed to accomplish this: a client may information space. Examples of activities that
simultaneously connect to each information space federates need are seamless information access,
directly or the spaces themselves may be connected explicit restrictions on usage (bi-directional) of
within a federation that allows one information space information, mediation of inconsistent data standards,
to be ‘extended’ by the contents of another. ensure shared information integrity, and information
service-level agreements.
The second model of interaction, that of having the
spaces interact directly (rather than through client Seamless Information Access: Subject to necessary
interfaces) requires higher-level service level constraints, federates want seamless access to
agreements between the respective managers, but it information within the information space. This
has the potential for interactions that are more means that they want their consumers to get
seamless and better managed. In this model, a information from within the information space
producer need not make a special effort to share without additional effort. They want information that
information with other information spaces, it merely they share with the information space to be shared
shares it with its ‘native’ information space and this with its consumers subject to restrictions set forth
space ensures that it is shared appropriately with below. Essentially, while there may be many policies
other spaces. The advantage is fairly clear: that have to be negotiated between the managers of
federation services connect information spaces federated spaces, in the end, clients should not be
together for the purpose of providing consumers a aware that a seam exists.
“single” information space. However, the challenges
There are several mechanisms that may be employed
to establishing the necessary interfaces and
to do this: one is a complete replication of
agreements bear further discussion. The federation
information from one space to another; a second is
interfaces to the information space encompass trust
periodic requests for information; and a third is
management, confidentiality and integrity
establishing ‘standing’ information requests (similar
management, policy mediation, content filtering,
to consumer subscriptions) that result in sharing a
information replication and pass-through processing.
subset of the available information. The third option
Coalition federates exacerbate concerns that, while implies an ability to accept subscriptions from other
not unique to a coalition environment, do warrant information spaces. An extension to the third option
discussion. Among these concerns are trust and is to allow consumer query requests to be “passed
security and access to information catalogues. through” to the federates for processing.
• Trust and Security: While coalition partners
Explicit Restrictions on Usage (Bi-directional): An
may be assumed to be trusted, coalition systems
information space is likely to be trusted by the
are often not. Therefore, a coalition environment
producers and consumers that use it, but it may not be
will need to enforce national-specific multiple
trusted by another information space. Even if there is
security levels. Federate interfaces should
trust in the space itself, a federate may impose usage
support traditional approaches for discretionary
restrictions on information that it shares. These
and mandatory access, provisions for security
restrictions may limit who can access the information
downgrades, content filtering, and on-the-fly
and the ability of the recipient to pass the information
auditing.
on to third-party information spaces.
• Controlled Catalogue Access: Coalition Mediation of Inconsistent Data Standards:
information management is typically Different information spaces are more likely to have
asymmetric; one country may choose to different data standards and interoperability
disseminate a piece of information that another requirements. Therefore, a federate would like to
would not. Even the mere fact that a country have information transformed to serve the needs of
holds a particular piece of information may not its community. Regardless of whether this
be releasable to another. This means that not transformation takes place before or after
only must MIOs be subject to access control, but transmission from one space to the next, it requires,
also the fine grained information contained in minimally, access to the syntax and semantics in use
catalogues. in the other federate. This implies that there must be

7 of 19
a mechanism to request this information. Navigate and Understand the Syntactic
Additionally, it implies that within the transformation Relationships among MIO Types: The information
layer of one or both of the federates that the space is a collection of information that is
transformation be performed, according to rules categorized according to type. Therefore, for
defined by managers of the spaces. managers to understand the space, they must be able
to navigate the collection of types and understand
Ensure Shared Information Integrity: A federate
how they support the goals of the enterprise. They
may need mechanisms to ensure that recipients of its
must determine the extent to which relationships
information can determine that information it is
between types should be used to define and propagate
providing has not been altered. Furthermore, as
policies.
clients within a federate make reference to a MIO
from a federate, they need some mechanism for To achieve this, the managers must maintain the
consumers of the MIO to dereference it. information catalogue of the information space.
Specifically, the managers must be involved in the
Information Service-Level Agreements: Much of
introduction of new types. When clients create new
the foregoing discussion has focused upon what a
information object types, they must describe these
federate may do to an information space, but not
objects to the information space to ensure proper
what an information space must do. These
handling of the new MIO type; part of the description
obligations are often formalized by contractual
may include relationships to other types. Based upon
information service-level agreements (SLAs). An
the description provided, managers must decide
SLA commits a federate to a stipulated level of
whether to permit the new object type, and determine
service. An SLA may specify requirements like
what policies will apply to it, perhaps based in part
regular updates to certain types of information.
on how the MIO type relates to other types.
Therefore, an SLA could specify trust and
confidentiality requirements, quality of service Additionally, managers may need to assign ancillary
expectations in terms of timeliness of response to information to MIO types to be stored within the
requests and the degree of relevance of information, information catalogue. For example, this may
mandatory feedback from the federate at predefined include syntax checkers, payload renderers, and
intervals, and requirements for information recall. contact information for the owners of the MIO type
For example, an SLA could stipulate that not only standards.
shall the receiving federate be notified of an MIO
Dictate and Understand Prevailing Security
recall, but also all other federates be notified who
Policies on MIO Types: Managers are responsible
have received related or derived MIOs.
for setting security policies for the information space.
With respect to MIOs, this policy is likely to be
2.2.4. Managers
defined at the level of the MIO type. As mentioned
Managers are responsible for monitoring and above, policy may be explicit and unique to a type, or
controlling the information. Management services are inferred based upon the type’s relation to other types.
those set of processes that allow the information Generally security policy ultimately relates a user to
space to be managed by a staff. These services the actions that he or she may perform on information
enable the information space to process information of a specified type. There are many ways in which
demands in a timely, reliable manner through this may be specified, such as role-based access
judicious use of policies, resource management and control described below in the Security Layer
maintenance. A key element for management section. In a ‘static’ role-based system, policies
services is ensuring performance by managing the define privileges that are granted to roles and then
lifecycle of the individual MIOs. To use the users are mapped to one or more roles. These
information space within a coalition environment, it mappings are the responsibility of managers. In a
is vital that access control policies be set and ‘dynamic’ role-based system, these mappings may
enforced. Manager responsibilities are as follows: change as a function of time or operational context.
navigate and understand the syntactic relationships
among MIO types; dictate and understand prevailing To ensure that the maximum utility of information is
security policies on MIO types; monitor and control realized, managers must balance security concerns
resource allocation and performance; ensure accurate against operational imperatives. Balancing
data mediation; configure and monitor effectiveness constraints is fundamentally the role of a manager.
of information support; establish and maintain However, the degree of expressiveness in defining
federated space relationships; maintain information and enforcing policy bear direct relation to the
space currency; and audit information infrastructure subtlety with which the manager may balance
transactions. competing interests. Within the domain of security

8 of 19
policies, context- and content-based policies access or to modify the policies and resource allocations
control policies are examples of increased within the information management infrastructure.
expressiveness that may allow more precise control
Establish and Maintain Federated Space
of information to maximize utility without violating
Relationships: As information spaces are federated
security constraints.
together, managers are responsible for negotiating the
Monitor and Control Resource Allocation and terms of participation in the federation. This includes
Performance: Managers are responsible for ensuring defining policies on access control, usage restrictions,
that available resources are used effectively. In an data sanitization, and identity anonymity.
information environment these resources may include
Maintain Information Space Currency: Managers
distributed storage services, networking
may be responsible for ensuring that the information
infrastructure, and computational assets. A manager
space does not become cluttered with irrelevant or
must be able to monitor (at least indirectly) a system
outdated information. They are responsible for
in order to control it. Therefore, key components of
maintaining the performance of the information space
the system must either report to or support status
that might become impaired if too much information
queries from managers. Additionally, the managers
accumulates in the space. Whatever the reason, the
must have some understanding of the value of the
managers must manage information space
information being managed to ensure that resources
repositories and the movement of information
are meeting users’ needs. Often, this is best achieved
through them. Specifically, managers determine if
by feedback from the users.
information is put into the persistent and archive
Ensure Accurate Data Mediation: Managers must repositories and when it is removed from them.
understand how information standards apply and
Audit Information Infrastructure Transactions:
evolve over time. Specifically, the way in which
Managers should promulgate policy that information
communities of interest use information changes over
sufficient for auditing transactions with the
time, and the syntax and semantics of the information
information infrastructure be logged for post facto
they share changes to reflect that. However, it is
analysis. These transaction include not only client
often unrealistic to assume that all users will switch
interactions (e.g., MIO publication), but management
from older versions to newer versions in lockstep.
interactions as well (e.g., modification to access
Even if they did, there may still be information in the
control policies). Managers must have access to
repository of the older format.
these logs to establish culpability in the wake of
To ensure that information is not sent to clients in a unfortunate events and to measure metrics of
format with a version that exceeds the latest they can performance over time.
understand, it is necessary for newer information to
be transformed into older formats for ‘legacy’ 2.3. Service Layers
systems that need it. For example, managers may The activities of information management are
classify type revisions as either ‘major’ or ‘minor’: organized into service layers. While the activities are
minor revisions being those that can be converted essential to the model, the layers are solely intended
into an older version within the same major revision. to add clarity to the model; other organization
Major revisions are those that are too different from schemes can certainly be developed. The activities
older version and cannot be converted. Note that within the layers, each a verb phrase, is an action that
these differences may be either syntactic or semantic is performed. Generally an activity will interact with
in nature. actors, the information space, and/or other activities.
The ordering of the layers, while notional, does
Configure and Monitor Effectiveness of
generally indicate a reasonable ordering of activities
Information Support: Information is seldom an end
that may occur as MIOs flow from producers into the
in itself; generally it is a means to achieve higher-
space and then back out to consumers. The
level objectives of an enterprise. Managers need to
information management model depicts six service
understand the extent to which the information they
layers: security, workflow, quality of service,
manage is accomplishing these objectives. In a well-
transformation, brokerage, and information space
run enterprise, processes exist not only to directly
maintenance. Each service has a specific set of
support its objectives, but to improve the means by
activities that enable the information management
which information managers support them. One
system to effectively manage and provide value-
mechanism is feedback from producers and
added processing to information within information
consumers of information. Managers can use this
space.
information to influence the behaviour of these actors
2.3.1. Security Layer

9 of 19
Published products will include security and release operating procedures. Additionally, workflow models
metadata. It is the responsibility of the producer of may identify or refine particular roles in particular
the information to associate appropriate security and coalition contexts. A role will not usually be unique
release conditions, which must be enforced by the to a user, thus role based access control is coarser
information space. Release conditions should be grained than user based access control.
specified in terms of nationality and role.
Roles, as defined above are used as the atomic unit to
Publication of information to the space must not which access rights are assigned. Access rights are
degrade the confidentiality, integrity and availability specified in terms of allowed transactions with the
of the published information or the service provider information space for particular roles. Examples of
publishing the information. In particular, the space transactions include publishing information to the
must be able to preserve information integrity by information space, browsing or subscribing to the
ensuring that publishers authenticate to the space (so information space, or creating new information object
that the origin of information is not ‘spoofed’) and types. An allowed transaction may be specified in
that information, once placed in the space, cannot be terms of the type of information that a particular role
tampered with either by the producer or a third party. may retrieve from the space; or alternatively types of
In addition, the space needs to ensure that clients are information that a provider may publish to the space.
appropriately authenticated so that there is an
Log Transactions: Logging is the process of
appropriate level of confidence that information is
collecting significant management, federate, producer
only released in the manner prescribed by the release
and consumer actions in accordance with
conditions.
management policy to support subsequent audit and
The space should also have defence mechanisms to performance tuning. Logging can include collection
prevent hostile clients from launching denial of of who accessed the information space, for what
service attacks against information providers through purpose, what information was provided or recovered
its infrastructure. However, the main focus of the and when the transaction took place.
security layer is upon the provision of security
Logging policy is set by management and specifies
services within the information domain, not at the
the level of detail that must be logged for individual
networking layer. The primary functions of the
transactions with the space. The policy should also
security layer are controlling access, logging
specify the longevity of the logging information
transactions, auditing logs, negotiating security
together with an appropriate archival policy.
policy with federates, transforming identity, and
sanitizing content. Audit Logs: This is a management activity, probably
specified by policy but not necessarily automated,
Control Access: The security service layer is
that investigates the trail of activities captured by the
responsible for ensuring that only appropriately
information space’s logs. These logs can be audited
authenticated producers, consumers, managers and
for security reasons, after action review to determine
federates interact with the information space. In
which actors had access to what information at a
addition, individual actors will be allowed to perform
particular time, and also in support of workflow
differing sets of interactions dependent upon their
process audits.
role and the management specified access control
policy. In a dynamic coalition, this policy may vary Negotiate Security Policy with Federates: It is the
over time. This reflects the expansion or contraction responsibility of management, supported by the
of the coalition and the evolution of the individual security layer, to negotiate appropriate access and
roles over the life of an operation. information replication between federated
information spaces. The result of the negotiation
Access control policy sets procedures and rules for
process will be codified in federation security
those interacting with the information space, i.e.,
polices, which may require client identity to be
consumers, producers, managers and federates. The
removed before onward transmission of requests; the
access control policy needs to be able to set and
removal/modification of MIOs prior to replication of
revoke access rights based on current roles of
information to the federate space; or the modification
participants.
of MIOs in response to queries from federated
Information space participants must be assigned a spaces. All of these actions should be logged and be
recognized role, or set of roles, prior to interaction subject to audit.
with the space. These roles should be based upon
Transform Identity: The security service layer has a
externally recognizable characteristics, such as
role in protecting the identity of clients, when their
nationality, specific job function, or location – either
requests are passed to a federated space and also in
nationally determined or as specified in the coalition

10 of 19
passing feedback to producers. In both cases, the workflow “centered” but rather it may be workflow
actual role played by the client and their specific “enabled” or workflow “sensitive.” The primary
identity are not required either by the federated space functions that enable effective enterprise workflows:
which will respond to the request or by the producer managing workflow configurations; instantiating and
receiving feedback on their product. This type of maintaining workflows; linking workflow instances;
function can be considered as similar to name address and assessing and optimizing workflow enactment
translation at the network layer, i.e., the end point performance.
does not know the identity of the starting point of the
Manage Workflow Model Configurations:
connection, but the communication is still bi-
Workflow model configuration management is a set
directional.
of processes to define, maintain, alter, and archive
Sanitize Content: The security service layer also workflow models. These models are stored in the
plays a role in the sanitization of content. Here information catalogue. Archived models support
sanitization is taken to mean the modification of post-facto analysis for later analysis after enactment
MIOs, in line with security policy, prior to for the purpose of workflow evolution and
transmission to a less trusted federated space or improvement.
consumer.
Instantiate and Maintain Workflows: Previously
defined workflow models are instantiated and
2.3.2. Workflow Layer
enacted during run-time. During enactment, users are
Enterprise workflows are the patterns of information assigned roles by the security layer based on the
flow that support the processes of the enterprise. The selected workflow. As a workflow executes, its state,
steps in a workflow may be manual or automated, but and those of its sub-workflows is maintained,
typically the execution of a step in a workflow monitored and audited.
involves consuming information from previous steps,
incorporation of new information and production of One of the primary advantages of using workflow is
new information. Depending upon how steps are the realization of the potential for workflow
initiated and terminated, workflows may be improvement. The ability to audit, instrument, and
categorized as either ‘event-driven’ or ‘schedule- track a workflow provides input to refining the
driven’ or a combination of the two. Generally, the workflow process. A workflow stopped and started
execution of a workflow proceeds according to a set at any executable step. Stopping a workflow blocks
of predefined rules with users and applications it from further execution until it is restarted. Note
participating according to their roles. Workflow that the security manager is responsible to allocate
instances may have a lifetime ranging from minutes privileges allowing control of executing workflows.
to days depending on the complexity and the duration A generic reference model for workflow was
of the various constituent activities. published by the Workflow Management Coalition
(1995)5 and later adapted by the Object Management
There is an important distinction between workflow Group (2001)6. Our information management model
models and workflow instantiations. Workflow has adapted key aspects of these models.
model definition occurs at “design-time,” while
workflow enactment occurs at “run-time.” There are issues of workflow monitoring in a
Workflows may be altered on-the-fly during coalition environment. Countries may be reluctant to
“execution-time” so they are dynamic and subject to have their work measured, monitored, or controlled
change. Workflows may also be “ad-hoc,” in which by a workflow. Therefore, workflow should rarely
case they are designed and executed on-the-fly during be mandatory. Moreover, coalition partners will
run-time. Like other lifecycle artifacts, workflow likely be using different workflow tools, platforms
models should be managed and placed under access and processes. For these reasons, workflow
and configuration controls. Transitions between interoperability may be a consideration during design
states during a workflow execution should be subject of a workflow model.
to logging and auditing.
5
Finally, workflows may be hierarchically "The Workflow Reference Model", Document
decomposed into sub-workflows that execute Number TC001-1003 by the Workflow Management
concurrently or sequentially. If a MIO is shared Coalition, 19-Jan-95 Author David Hollingsworth
between workflows, then the MIO is visible to them found at http://www.wfmc.org
6
concurrently. Workflow management Facility Specification,
V1.2" Object Management Group (OMG), April
Incorporation of workflows within the model is not to 2000, found at http://www.omg.org, OMG Domain
suggest that information management system must be Specifications

11 of 19
Link Workflow Instances: Executing workflows • What bandwidth do they expect to receive
can be linked on-the-fly during run-time to create through the information space?
new workflows. Workflow instances may be either • What bandwidth from the information space can
sub-workflows or related workflows. MIOs may be they deal with?
shared between sub-workflows but may not be shared
between related workflows. Allocate Resources to Clients: Resources need to be
Assess and Optimize Workflow Performance: managed to ensure that consumers receive an
Workflow processes are rarely defined perfectly the appropriate level of service from the information
first time. Experiences and metrics derived from space both in terms of timeliness of response to
previously enacted workflows can be used for requests and subscriptions; and also in terms of
workflow redefinition and improvement. This quantity of information. Similarly, producers need to
activity encompasses the assessment of previously be able to interact with the space in an efficient
enacted workflows for the purposes of workflow manner. This means that the QoS layer should ensure
model improvement. that feedback from the space is delivered in a timely
manner and that the producer is not overloaded by
RFIs. The QoS layer needs to take into consideration
2.3.3. Quality of Service (QoS) Layer
consumer constraints such as low bandwidth links or
The Quality of Service (QoS) layer is responsible for end-user device limitations.
ensuring that an information management system can
best serve the needs of its consumers, producers and The QoS layer is also responsible for ensuring that
federates, when faced with changing operating producers can submit information to the space as a
conditions. A task made more difficult as these non-blocking activity. This means that the producers’
clients can’t always clearly specify what QoS availability should not be adversely affected by
attributes they require from the information interactions with the space. Similarly, a consumer
management environment. submitting feedback information to the space should
be able to submit this without impacting on
Quality of service can occur at different levels and it performance.
is important to differentiate the QoS at the
information level from the QoS of the underlying Prioritize Results: The information space must be
communication mechanism. While it is desirable to able to support consumer preferences for ordering of
implement an information management system over a information. This ordering may be defined by some
communication system that has a high level of QoS, form of user defined manipulation function that
having poor QoS in the communication domain does should reside within the transformation layer. In
not preclude having a high QoS in the information addition, information prioritization should aim to
domain. Having good QoS in the information maximize the amount of ‘real’ information passed to
management system would mean that when the the consumer, e.g., if two adjacent MIOs between
communication system manages to send a piece of them match a consumer’s geographically related
information, it is more likely to satisfy the needs of query and a third MIO, which matches the query,
the client. Conversely, having low QoS in the overlaps with the previous MIOs and adds no further
information domain but high QoS of the new information, then only the first two MIOs should
communication layer would mean that the client be sent.
would reliably receive information that might not From the perspective of an information producer, the
meet its needs. The activities that can be performed information space would be expected to prioritize
in an information space to increase QoS in the RFIs being sent to producers. This prioritization
information domain are: respond to client context, should take into account any consumer supplied
allocate resources to clients, prioritize results, and priority information, policy set by managers of the
replicate information. space, the ability of the producer to respond to the
Respond to Client Context: In order to provide a RFI both in terms of bandwidth constraints and the
context for their QoS requirements information amount of outstanding concurrent requests for
clients may need to be able to specify their information.
environment. This may include performance metrics Replicate Information: The QoS layer is
like: responsible for ensuring that appropriate MIOs are
• How many objects per second could they create? replicated to federated information spaces. This
• How many objects per second are they prepared function is required to meet service level agreements
to consume? between federated information spaces, provide
• How many objects per second do they need resilience in the information domain by providing

12 of 19
multiple repositories for critical information, and to • Changing format to send it in a format usable by
ease consumer pressures on particular information a client software
spaces for frequently requested information. The • Cropping the image to only cover a specific
information replication process needs to be managed region
so that replication is scheduled to take into account of • Lowering the resolution to meet security related
the need minimize the impact on the performance of policies
the information space whilst still ensuring that
information is replicated in a timely manner. Support State- and Context-Sensitive Processing:
Context-sensitive processing functions are activated
2.3.4. Transformation Layer depending on the operating context of either a single
In an information management environment, the role client or the information space as a whole. The role
of the transformation layer is to adapt information as of these functions is, to a certain extent, to
it enters or leaves the information space in order to automatically configure the information space based
satisfy client needs and management policies. The on external inputs and pre-established conditions.
primary activities within the transformation layer are One example of a processing function affecting a
contextualizing information, transforming MIOs, single client is to lower the resolution of images sent
state- and context-sensitive information processing, to it when the client’s connection to the information
and managing and executing user-defined space operates in a degraded condition. A more wide
information processing requests. spread impact might occur if a new coalition partner
or NGO is allowed access to the space, which would
Contextualize Information: Information context affect management policies including acceptable
comprises the manner in which information relates to format for release of different types of MIOs.
other information, workflows, and enterprise
objectives. While most consumers may be content to State-dependent processing depends not only upon a
consume MIOs in their native format, others may processes current input but also upon its past history.
desire information to be set in context prior to The information space operates in a dynamic
delivery. This may require that elements of this environment, so it is necessary for processing
context be combined with the MIO. Typically, the functions to maintain their status while waiting for
user may define what context is of interest and how it new information to process in order to prevent
is to be represented; this is an example of a user- redundant accesses to the information repositories,
defined processing function. Other alternatives duplication of computation and superfluous
include manager-defined contextualization or clients transmissions to consumers.
that perform this as a value-added service. Support User-defined Processing Functions: The
An additional function of contextualization is to information space must allow users to define their
evaluate newly posted information. This facilitates own processing functions to adapt (tailor) the
the work done at the brokering layer such as information space to their specific needs. Users that
providing clients with information closely related to want information transformed (e.g., manipulated,
their needs by supporting prioritization decisions and translated, aggregated, or combined) should be able
determining suitability to address specific needs. to define a transformation function and have the
computational and communication resources for its
Transform MIO: Even though there may be a one- execution managed by the information space.
to-one correspondence between published MIOs and Whether the resultant information is available to only
information delivered to a consumer, the consumer that client or to a broader group is a management
may not want to consume the information in the same decision.
form as it was produced. When requested by a
consumer, MIO may be modified in order for that There are several reasons to support this activity: to
piece of information to fulfil the needs of the reduce tedious manual manipulation, information
consumer and to meet the constraints specified by the overload, and network load. The first reason, of
managers of the information space. Therefore, the course, reinforces the second. The third recognizes
transformation layer may transform MIOs into more that not only are consumers burdened by ‘non-
readily transmitted and consumed formats. This may decision quality’ information but so is the network.
entail the transformation of the payload, the Support Manager-defined Processing Functions:
metadata, or both. These transformations can take The information space is a dynamic environment and
several forms. For instance, some of the new types of information and format get added. The
transformations that could be performed on satellite purpose of manager-defined information processing
imagery are: functions is to maintain transformations allowing the

13 of 19
mediation of one MIO version to another and over the MIO metadata to filter out irrelevant
reconcile inconsistencies between the formats. These information. These subscriptions are stored as part
functions are activated when sending information to a of the client status information catalogue. As a new
user that requested a different version of the MIO. MIO is posted by a producer to the information space
Manager defined information processing functions maintenance layer, the brokerage layer is notified so
can also be invoked to satisfy security restrictions by that it can determine which subscribers are interested
the modification of MIOs so that the information in it. The subscribers can then be notified. To meet
released is consistent with security policy. the tailoring requirements of a subscription, it may be
necessary to pass MIOs through the transformation
2.3.5. Brokerage Layer layer prior to sending them on to the subscriber.
The role of the brokerage layer is to match available Process Request for Information (RFI) and
(or potentially available) information to information advertisements: Finding ways to satisfy unmet
needs. Brokering of available information involves demands for information require awareness of the
activities that reflect the means by which consumers demands, potentially available information products
seek information: processing queries, notifying actors and the means to influence the production of that
(principally consumers), and maintaining and information. The client status information catalogue
fulfilling subscriptions. Note that the brokering layer at the core of the information space maintains
does not have a significant role in search and browse information about both consumer needs and
interactions because in the mode, consumers are producers’ potential products. Based upon this
largely ‘self-brokering’ with the assistance of information, RFI processing may identify potential
Google-like indexing that is supported by the producers, and forward RFIs to them, sanitized if
information catalogue. Brokering for information necessary. Ideally, producers will acknowledge if
that is not currently available is more complicated as they will meet the needs and if it appears that a need
it involves processing consumers’ requests for will go unsatisfied, then managers may be brought in
information and producers’ advertisement of to rectify the situation. The managers must
potential products. Finally, to support federates that determine if a need is valid, prioritize it for resource
desire seamless interaction with the information allocation and then, using their awareness of how to
space, the brokerage layer may support federate influence the production information, attempt to
proxies that handle consumer requests forwarded make producers responsive to it.
from other information spaces. The brokerage layer
is responsible for processing queries, maintaining and Support Federate Proxies: A federate information
fulfilling subscriptions, processing requests for space may choose to delegate the fulfilment of one of
information and supporting federate proxies. its consumer requests (whether it be a query, RFI, or
subscription) to the information space so that
Process Queries: A query request is a well- information may be shared seamlessly. While simple
structured request that retrieves information for a in concept, the complex trust relationships that may
consumer based upon a predicate that is evaluated exist between the spaces (and the communities they
against the metadata of MIOs in the persistent serve) complicate things. To handle these
information repository. There are three appropriate complicated issues, rather than having federates
responses to a valid query: notification that no interact directly with brokerage activities, the
available information meets the criteria of the query, brokerage layer supports federate ‘proxies’ that do
a complete set (either references or entire MIOs) so, in a controlled manner, on their behalf. These
matching the request, or a partial result set. The first proxies may perform tasks such as masking the
two ‘complete’ the transaction, but partial results are identity of the requesting consumer or aggregating
more complex because consumers should be able to subscriptions to reduce duplicate transmissions to the
‘page’ through partial results sets until they are federate. It may also have to sanitize queries,
satisfied. In any case, once the brokerage has a result subscriptions, RFIs and advertisements prior to
set, it may pass it to the transformation layer to tailor passing this information on to a federate.
and prioritize it prior to passing it back to the
consumer. 2.3.6. Information Space Maintenance Layer
Maintain and Fulfill Subscriptions: Subscriptions The information space maintenance layer interacts
are on-going requests for information that are directly with the underlying information space. It is
satisfied as new information becomes available. responsible for: posting new information to the
Consumers (i.e., subscribers) subscribe to information space repositories; verifying the format
information by describing what they need, generally (e.g., adherence to standards) for posted information;
in terms of the type of information and predicates informing the brokerage layer of the introduction of

14 of 19
new MIOs; managing the lifecycle of the MIOs in the MIOs may be retracted by authorized managers or
repositories – including retraction of MIOs by their clients. Many implementations will destroy the
producers; managing internal information space retracted information while others will tag the
performance; and providing support for configuration retracted information accordingly. Prevailing
management of models stored in the information policies related to auditing may require that posted
space (e.g., work flow models and MIO types). information not be destroyed or altered. We
Finally, it is responsible for retrieving specific MIOs generally believe that it is not a good idea to
from the information space repositories. destructively update information and that it is
preferable to post a new MIO and record the fact that
Post MIOs: When an information producer posts a
it supersedes an earlier MIO in the metadata of the
MIO to the information space, the information
new object or externally in a third MIO, or by tagging
maintenance layer is responsible for the insertion of
the superseded MIO.
the MIO into the correct information repositories. If
subscription for new information is supported for a Manage Internal Information Space Performance:
specific type, the broker layer must be notified of the As an internal activity, the information maintenance
existence of new information. It may then determine layer manages the internal information space
which consumers are interested in the information. performance. There are many means of doing this,
Once identified, the information may be queued for the details of which are certainly implementation-
delivery from the transient repository to the specific. One means of doing this is to constrain the
consumers. size of the information repositories through
appropriate archiving to limit the growth of the ‘on-
Verify Adherence to Standards: It is desirable that
line’ transient and persistent repositories. Other
information posted to the information space adhere to
options include physical placement of information in
prevailing standards. These standards may include
a distributed system, and configuration of clustering
naming conventions, proper syntax, encoding, et
caching mechanisms and partitioning of system
cetera. In an efficient information management
resources by MIO type. Since the ‘internal’
environment, verification will be an automated
organization of the information space bears upon the
process based upon rules promulgated by the
quality of service of the system, there is likely to be
information managers. For example, the metadata for
interaction between this activity and the QoS layer.
a MIO may be encoded in extensible markup
language (XML) and validated against a XML Retrieving specific MIOs from repositories: As
schema appropriate to that type of information. many MIOs are likely to be transmitted by reference
Furthermore, the payload may be validated for (e.g., a hyperlink), it is necessary that there be a
adherence to standards. means of retrieving a MIO from a repository based
upon such a reference. Similar to web servers today,
To verify adherence with standards, information
there are a number of potential ways to request
managers must first register both the standards and
information and several exceptional conditions that
the mechanisms for verifying compliance with them.
may result. Unlike a traditional web page, MIOs
Managers store this information in the information
have both metadata and (optionally) payload, and
models catalogue where it is associated with the
consumers (or services) may desire one, the other, or
appropriate MIO types. When MIOs are posted to
both.
the information space by producers or federates, their
adherence to prevailing standards can then be verified
2.4. The Information Space
before the MIOs are placed into the repositories.
Within the information domain, the information
Manage MIO Lifecycle: Within the information space comprises the set of managed information,
space, MIOs are stored in one of three places: regardless of where is it physically resides.
persistent repository, transient repository, or in an However, the placement of the information, who has
archive. The transient repository holds MIOs to control over it, and the operations they can perform
support subscription servicing. The persistent have a significant impact upon the effectiveness of
repository holds MIOs to respond to queries. Finally, management and the value gleaned from the
the archival repository is for long-term off-line information. In other words, just because
storage. It is the responsibility of managers to define information exists within the space that does not
policies for the movement of MIOs between these mean that those who need it and who should be
three repositories. Once a MIO has been removed authorized to get will necessarily get it. Nor does it
from the transient and persistent repositories, it is no mean that those who have information to share will
longer available to the brokerage layer. Management be able to effectively do so. The suboptimal
action is required to retrieve MIOs from the archive. utilization of information often arises because

15 of 19
stewards of information do not feel empowered or this expressiveness is related to the number of
motivated to share that information, or simply possible references between information objects.
because consumers do not know how to ask for it.
An important kind of metadata for information
While the model does not distinguish between objects that needs to be expressed is related to
implementations that make management activities detailing the provenance of information – the
easy or hard (or impossible), it does suggest that a information pedigree. Information pedigree is
coherent management strategy is important. necessary for mediating policies in a federation of
Furthermore, while not represented in the model, we information spaces, for instance, when a new piece of
assert that technologies are emerging that allow an information is derived from diverse information
information space to be constructed in ways that elements that have different release conditions.
either facilitate or allow automation of many Information pedigree is also necessary for consumers
activities of information management. In particular, to determine if a piece of information corroborates
we should be able to build information spaces that are another one or if they originate from the same source.
distinct from producer’s and consumer’s applications.
Models: The Information Models catalogue contains
Such an approach enables management of
the taxonomy of the different MIOs supported by the
information by those able to do so in a coherence
information space. This catalogue can be organised
manner matched to enterprise objectives. This is
hierarchically to support specialisation of MIOs. This
seldom achieved by end-user applications. The
catalogue allows consumers to discover information
‘coherence’ information space is not necessarily
categories that are of interest and to browse,
centralized, nor is it oblivious to the needs and
subscribe to, or query for them. The Information
constraints of information producers and consumers.
Models catalogue also serves as the basis for the
It does, however, enable the emphasis to be on
description of user-defined transformation as well as
information and the demands for that information
for the tailoring of the information from producer
rather than working around the limitations of
specified information models to consumers specified
information producers.
ones.
The information space comprises information
Workflow models are also stored within the models
repositories and an information catalogue that
catalogue. A workflow model is a template for
enables consumers’ and producers’ information
interaction that allows certain patterns of activity to
requirements to be met. The activities within the
be coordinated more easily. Instances of these
service layers within the model enable the
templates can be specialised for specific needs.
information space to be managed and interact with
producers, consumers and other spaces. Client Status: The Client Status catalogue contains
information that describes the current status of the
2.4.1. Information Catalogue producers and consumers that interact with the
The role of the Information Catalogue is to maintain information space. While client status may contain
all the meta-information related to the use of the information not directly related to the management of
information space and the information contained information (e.g., unit operational readiness), we
therein. The following describe the different types of focus upon status information that is. Specifically it
meta-information needed to adequately manage may describe products that producers are capable of
information. producing and information that consumers desire.

Stored Information: The stored information Consumer status may contain descriptions of its
catalogue contains the index of all the accessible needs, particularly those that are not adequately met
information in the local repositories. This catalogue by the information space. It may also specify
is used when querying the information space. constraints (such as available bandwidth) that affect
Another use for this catalogue is to allow published its ability to consume information. Producers can
information objects to reference one another. query this catalogue to find potential consumers for
Reiser’s law of information economics states that the products they can produce. This information is
expressive power of an information system is necessary to prevent producers from having to
proportional not to the number of objects that get publish volumes of information, even though there
implemented for it, but instead to the number of may be no demand for most of it, simply because
possible effective interactions between objects in it7. there is no mechanism by which they can determine
In the case of an information management system, consumers’ needs. The request for information could
contain the type of information needed, using the
Information Models catalogue, as well as other
7
ReiserFS – http://www.namesys.com/v4/v4.html

16 of 19
metadata such as the area of interest and the time information maintenance policies. In some systems,
period. such as peer-to-peer systems, the transient
information may be stored on the producers, web
Producer status information is complementary to the
caches, or intermediary nodes in a virtual overlay
consumer status information. It allows producers to
network.
describe the information products they can make
available. The taxonomy of possible products needs Persistent Information: Persistent information is
to be described in the Information Models catalogue information from producers that is retained by the
to allow the Information Space to match consumers’ information space as defined by the management
needs with providers’ capabilities. Also, a description policy. Unlike transient information that serves
of information products permits consumers to select a consumers that have expressed interest for
preferred producer for a particular type of information prior to its production (via subscription),
information. This selection of producers can also be persistent information serves those that wish to
based on policies stating authoritative sources for search/browse, or query for it after the fact. The
specific types of information. persistent information repository is the working
repository of the Information Space. To avoid having
Another use for the Information Providers catalogue
the size of the repository grow to the point where
is to include the list of Subject Matter Experts
performance (or information quality) suffer
(SMEs) on different topics. These topics can range
unacceptably, it is likely that information will have to
from a specific type of information described in the
be removed from it after a time. Ideally, this is
Information Models catalogue to higher level
subject to policy based upon how the information is
domains such as amphibious operations planning.
used within the enterprise.
The information provided by SMEs might not transit
through the Information Space but the fact that this Archival Information: Information that is in the
information was requested should. archival repository is not directly accessible to
consumer processes. A separate management process
2.4.2. Information Repositories must be invoked to recover archived material. An
The role of the Information Repositories is to receive, information space may have a policy that defines
maintain and provide the actual pieces of information when information is moved from the transient or
or MIOs. The different types of repositories are persistent repository repositories to the archival
transient, persistent, and archival. The repositories repository. Typically, this off-line storage is used for
roughly correspond to the lifecycle of the MIOs they auditing purposes.
persist. The transient information repository is a
temporary holding place for newly published 3. HOW TO APPLY THE MODEL
information. The persistent information repository Many systems and technologies claim to address the
holds ‘active’ information so that it can be queried information management problem. However, in the
for. Finally, the archival information repository absence of a detailed model of information
holds ‘inactive’ information that is no longer directly management, it is hard to express military
available for querying by clients. The policies information management requirements and to assess
describing the transition of information object from how well products and systems support requirements.
one repository to another are set through the Simply stating that information management is the
information maintenance service of the management capability to provide the right information, in the
interfaces. right place, at the right time does not provide a yard
Transient Information: Transient information is stick against which to measure a systems capability
information from a producer that is in the process of (it is about as useful as specifying that a system be
being relayed onto consumers; it is ‘passing-though’ ‘user friendly’). Indeed, the real questions are who is
the information space. Consumers must subscribe to going to perform what information management
transient information in order to receive it. An activities, with what resources, and will this support
information space may use a transient repository to the operational objectives of the enterprise.
hold transient information until it has been delivered The model, as defined in section 2.0, provides an
to all consumers. Transient information is not abstract representation of the important actors and
retained on a long-term basis by the information activities that are required to form a functional
space and in particular consumer processes cannot information management system. There are several
query against the transient repository. An information ways to apply the model, such as assessing existing
space may copy some or all transient information into technology/systems, specifying requirements for new
a persistent or archival repository according to systems, and understanding capability gaps. The

17 of 19
remainder of this section describes two applications JBI is built around the information space models
of this model: assessing existing technology/systems catalogue that holds schema (and other related
and specifying requirements for new systems. information) about the set of MIO types supported in
the system. This allows JBI to have type-based, in
3.1. Assessing Existing Technology and Systems addition to role-based, access control. SharePoint
The model can be used to assess the degree to which does not implement a model catalogue and therefore
a specific set of technologies support information is not type based. Its access control is based upon
management requirements. Generally we are role and location in the site collection. JBI’s type
interested in the flexibility of these systems, the based system relies more on queries over structured
degree to which they automate information metadata whereas SharePoint relies more upon full
management activities, and the ease and text indexing augmented by document metadata.
expressiveness of actors’ interactions with the
Perhaps less obvious are the underlying assumptions
technologies.
about lifetime of information. JBI places a premium
The model has been used to assess two technologies: on rapid posting and delivery of new information
the Microsoft® SharePoint™8 and the Air Force with new objects being published at potentially sub-
Research Laboratory Joint Battlespace Infosphere9,10 second rates. SharePoint works at time scales more
(JBI) reference implementation11. SharePoint12 is a amenable to human processes. In the model, the
content management portal. The JBI is an difference is evidenced by JBI’s emphasis on the
information management capability envisioned to transient repository. Both JBI and SharePoint require
support military needs. The fact that one of these is a the persistent repository.
commercial tool while the other is a science and
JBI is developing a sophisticated implementation of
technology (S&T) project highlights the fact that an
the transformation layer activities of the model13,
information management model can be used in
whereas SharePoint has better support for
different phases of the acquisition process. A chief
incorporating pre-existing information sets through
information officer may need to evaluate SharePoint
linking to external file systems.
versus other commercially available content
management systems. The research laboratory or Despite these differences, there are several
commercial company may look to the model to find similarities, most notably in sections of the model
which elements of the model maximize the return on that they do not support well. Neither system has
investment of R&D resources. addressed the heterogeneity- and security-related
aspects of federation well. Neither system organically
Without providing the detailed analysis here, it is
supports producer/consumer feedback mechanisms.
clear that the different systems emphasize different
Both have only limited QoS management capabilities
parts of the model. Both systems support Publish,
to date. SharePoint has a limited workflow capability
Subscribe, Query and Browse. SharePoint excels at
built in, third party tools are much better. JBI
management of more static, page-oriented
requires third party solutions for workflow.
information. Users can be alerted to updates to
Likewise, both systems require external tools to
individual documents, libraries of documents, or lists,
create and manage the archival repository. More
but consumers primarily rely upon search and browse
significantly, both currently lack automated means of
interactions. These strengths reflect typical uses of
removing information from the persistent repository
information portals. JBI, in contrast, primarily
as the value of the information decreases with time.
focuses on dynamic information; primary consumer
interactions are subscription and query. If the model is being used to assess available
commercial tools such as SharePoint to support
8 acquisition decisions, decision makers must decide if
SharePoint™ is a trademark of Microsoft lacking capabilities are important, and if so whether
Corporation. they will be supported through third-party tools that
9
United States Air Force Scientific Advisory Board, require integration or whether they will remain
"Report on Building the Joint Battlespace Infosphere, manual activities that incur recurring training and
Vols. 1 and 2," SAB-TR-99-02, December 17, 1999, manpower resources. If the model is applied to a
available from technology development effort such as JBI, it can
http://www.sab.hq.af.mil/Archives/index.htm help prioritize investment; for example emphasizing
10
http://www.rl.af.mil/programs/jbi/ a new browse activity over automated feedback to
11
Combs V., et. al., "Joint Battlespace Infosphere: producers.
Information Management within a C2 Enterprise," to
appear in ICCRTS 2005, CCRP.
12 13
http://www.microsoft.com/sharepoint/ http://www.fuselet.org/tech-overview/

18 of 19
3.2. Specifying Requirements for New Systems acquisition effort, but these exercises are often very
Management invariably involves striking balances budget-constrained, feature come-as-you-are system
between competing concerns. In an enterprise that heterogeneity, and require that nations and
relies upon information management – almost all communities of interest come together quickly to
enterprises do, whether they explicitly acknowledge accomplish specific goals. The lack of a common
this or not – some activities are more important than information management definition, let alone lexicon
others, and when they compete for resources, choices and defined set of activities, makes it difficult to
must be made. These resources include lifecycle address information management requirements
costs, infrastructure (e.g., networking) limitations, coherently. This model may serve as a basis for
and staffing requirements. planning “intentional activities” that need to be
supported to achieve the objectives of the exercise or
The proposed information management model
experiment.
provides a technology neutral description. Thus it is
equally applicable to a range of ‘systems’, from
4. CONCLUSION
manual information exchange processes to wholly
automated systems. An information management The proposed model provides an abstract
system, which implements this model can be representation of the important elements required to
constructed from a range of technologies and the form an effective information management system.
model itself should not be seen as a constraining The model captures the principal activities needed to
process that mandates a particular architectural style maximize the value of information to support the
e.g., publish and subscribe architectures, or service objectives of an enterprise. The model has been
oriented architectures. Rather it should be regarded as validated by the examination of a commercial
identifying the information management content-management tool (Microsoft SharePoint) and
requirements that would need to be supported by a developmental prototype (the JBI Reference
these architectures in order to provide an effective Implementation) that support information
information management capability. These management and the model's coverage of their
requirements allow one to specify, rank and weight capabilities.
each activity.
The proposed model provides a technology-neutral
Relating requirements to technology capabilities description of information management; it is equally
allows one to identify, and perhaps quantify, applicable to a range of systems, from manual
capability gaps. Technologies may be scored for information exchange processes to wholly automated
‘information management maturity,’ similar to how systems. An information management system that
NASA’s technology readiness levels (TRLs) measure implements this model can be constructed from a
technology maturity. For example, the most range of technologies, and the model itself should not
primitive information management environments be seen as a constraining process that mandates a
must support posting and browsing of unstructured particular architectural style (e.g., publish and
information. A slightly higher level may require subscribe architectures, or service oriented
controlled access and publish/subscribe of typed but architectures). Rather, the model should be regarded
unstructured information. A third level may require as identifying the information management
querying and metadata-characterized MIOs. These requirements that would need to be supported by
three levels provide basic access services. The next these architectures in order to provide an effective
tier adds capabilities to control performance with information management capability.
policy such as quality of service and
format/granularity mediation within the The model also has applicability in the planning of
transformation layers. Finally, the highest joint/coalition exercises/experimentation as it
provides a framework for identifying pieces of
information maturity levels support continual process
refinement and optimization. This encompasses both capability that could be brought together to provide
the Workflow layers and the feedback activities of joint/coalition information management. A natural
extension of this work is to define a set of
information management.
'information management maturity' levels that
Another application of the model in a military describe the efficiency of an information
context is in planning of joint/coalition management implementation. Further work is needed
exercises/experimentation as it provides a framework to define a universally recognised set of levels and to
for identifying pieces of capability that could be apply these in a coalition context.
brought together to provide an information
management capability in a coalition environment.
In a sense this is little different from any other

19 of 19

You might also like