Skip to main content

Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation

  • Conference paper
Intelligence and Security Informatics (EuroIsI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5376))

Included in the following conference series:

Abstract

This paper describes a novel architecture for anti-terrorism planning and resource allocation systems. The architecture uses web services and agents to provide a re-usable and extensible architecture for these types of systems. A dynamic web-based client and custom middle ware provide for the integration of otherwise de-coupled software components. The architecture has evolved from a longitudinal field study of U.S. Marine Corps anti-terrorism planners through recent empirical work in a more controlled setting. We describe this evolution, the architecture and its rationale, and provide some lessons learned for others engaged in development of anti-terrorism systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, H.: Intelligence and Security Informatics for International Security: Information Sharing and Data Mining. Springer, Heidelberg (2006)

    Book  Google Scholar 

  2. Yen, J., Popp, R., Cybenko, G., Taipale, K.A., Sweeney, L., Rosenzweig, P.: Homeland security. IEEE Intelligent Systems 20(5) (2005)

    Google Scholar 

  3. Avant, D., Baum, M., Bertram, C., Fisher, M., Sheth, A., Warke, Y.: Semantic Technology Applications for Homeland Security. In: Proceedings of International Conference on Information and Knowledge Management (CIKM 2002), McLean, VA, pp. 611–613 (2002)

    Google Scholar 

  4. Popp, R., Poindexter, J.: Countering Terrorism through Information and Privacy Protection Technologies. IEEE Security and Privacy 4(6), 18–27 (2006)

    Article  Google Scholar 

  5. Popp, R., Krishna, P., Willett, P., Serfaty, D., Stacy, W., Carley, K., Allanach, J., Haiying, T., Satnam, S.: Collaborative Tools for Counter-Terrorism Analysis. In: Aerospace Conference, 2005 IEEE, vol. 1 (2005)

    Google Scholar 

  6. White, G.B., DiCenso, D.J.: Information Sharing Needs for National Security. In: System Sciences, HICSS 2005. Proceedings of the 38th Annual Hawaii International Conference, p. 125c (2005)

    Google Scholar 

  7. Davies, S.: A year after 9/11: Where are we now? Communications of the ACM 45(9), 35–39 (2002)

    Article  Google Scholar 

  8. Cohen, P.R., Greenberg, M.L., Hart, D.M., Howe, A.E.: Trial by Fire: Understanding the Design Requirements for Agents in Complex Environments. AI Magazine 10, 32–48 (1989)

    Google Scholar 

  9. Berners-Lee, T., Hendler, J., Lassila, O.: The semantic web. Scientific American 284(5), 34–43 (2001)

    Article  Google Scholar 

  10. Laird, J., Newell, A., Rosenbloom, P.: Soar: An Architecture for General Intelligence. Artificial Intelligence 33, 1–64 (1987)

    Article  Google Scholar 

  11. Cohen, M.A., Ritter, F.E., Haynes, S.R.: Herbal: A high-level language and development environment for developing cognitive models in Soar. In: Proceedings of the 14th Conference on Behavior Representation in Modeling and Simulation, Orlando, FL, U. of Central Florida (2005)

    Google Scholar 

  12. Haynes, S.R., Kannampallil, T.G., Larson, L.L., Garg, N.: Optimizing anti-terrorism resource allocation. J. Am. Soc. Inf. Sci. Technol. 56(3), 299–309 (2005)

    Article  Google Scholar 

  13. Fischer, G., Nakakoji, K., Ostwald, J., Stahl, G., Sumner, T.: Embedding Computer-Based Critics in the Contexts of Design. In: Human Factors in Computing Systems INTERCHI 1993, Amsterdam, Netherlands, pp. 157–164 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Haynes, S.R., Kannampallil, T.G., Cohen, M.A., Soares, A., Ritter, F.E. (2008). Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds) Intelligence and Security Informatics. EuroIsI 2008. Lecture Notes in Computer Science, vol 5376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89900-6_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89900-6_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89899-3

  • Online ISBN: 978-3-540-89900-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics