Datagram Segregation Open Systems Service Approach
Navy SBIR FY2008.1


Sol No.: Navy SBIR FY2008.1
Topic No.: N08-055
Topic Title: Datagram Segregation Open Systems Service Approach
Proposal No.: N081-055-0604
Firm: 3 Sigma Research, Inc.
503 S. River Oaks Dr.
Indialantic, Florida 32903
Contact: James Dike
Phone: (321) 674-9267
Abstract: 3 Sigma Research proposes an innovative approach to develop a open architecture based data model and process for adding self-identifying information to a datagram. The power of our potential solution is in applying results from our research of Packaged Ontology Certificates to the unique performance issues with real-time processing of datagrams. Combining this with a revolutionary way of viewing how application development environments can enhance and facilitate the open services model of enterprise servers can potentially remove many of the obstacles that hinder migration to Service Oriented Architectures in a Global Information Grid (GIG) framework. Our Packaged ONtology Certificate Real Time Model (PONC-RTM) Investigation explores the concept for an enterprise information architecture that makes use of a PONC integrated into the datagram to extend automated, appropriate, delivery controls for information. Our innovative approach combines the power of ontology-based reasoning components in scalable open architecture to address the process of making intelligent decisions with regard to restrictions, purpose, and context of the data content.
Benefits: The potential of this approach positively affects every user in the enterprise. The greatest benefit is increased information assurance in data delivery. In addition, dynamic applications could now be developed to explore the effects of potentially disseminating real-time and UDP-based information more effectively; allowing IA managers to more effectively manage the security classification characteristics of the entire enterprise. We can envision this approach as a strong complement to cross-domain solutions. The strength and scalability of the approach could ultimately provide unique solutions to accessing existing knowledge not typically available in rapidly changing enterprise resources. Above any other benefit is the fact that, wherever warfighters are, secure information at the right level of detail and appropriately accessed or disseminated can greatly increase the efficiency of their activities.

Return