2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2012
DOI: 10.1109/soca.2012.6449431
|View full text |Cite
|
Sign up to set email alerts
|

Virtual disaster management information repository and applications based on linked open data

Abstract: In a typical technologically advanced region, data and information critically needed to support disaster preparedness and response decisions and operations are available but may reside not only in sources built by the government for disaster management purposes, but also in information sources owned by other government agencies, businesses, institutions, social media, etc. Making such data and information easily discoverable, available and useable by diverse time-critical disaster preparedness and response app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…The best examples are the public Wi-Fi stations installed in many café or convenience stores.  Mobile Assistants for Disasters (MAD) [7] or similar VR client applications: these applications may search and retrieve disaster mitigation and response information under the control of TIBS information flow traceability and use accountability services. Functional architecture of virtual repository (VR).…”
Section: System Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The best examples are the public Wi-Fi stations installed in many café or convenience stores.  Mobile Assistants for Disasters (MAD) [7] or similar VR client applications: these applications may search and retrieve disaster mitigation and response information under the control of TIBS information flow traceability and use accountability services. Functional architecture of virtual repository (VR).…”
Section: System Overviewmentioning
confidence: 99%
“…Users who want to obtain similar information outside of the emergency situations should do so via regular venues. Consequently, among the four components of Weitzner's Information Accountability Framework [7], policy specification and policy reasoning tools shall be rather straightforward to implement: the policy specification should prescribe the space/time limits for legitimate use of disseminated information while the policy reasoning tools should prevent the spread of information beyond those limits. The challenges lie with the detection of off-limit information use and the backtracking of information flow by means of transaction logs in order to hold the culprits accountable for their acts.…”
Section: Retrospective Tibs Technologymentioning
confidence: 99%
“…These services monitor the authorized information sources where the specified types of alerts and warnings are posted (or published) and notify ADAST when a specified alert is found (or received). Details on the structure, components and operations of ADAST are omitted since they are unimportant to our discussion here and can be found in [9].…”
Section: To Enable Discovery and Effective Use Of Data In Independentmentioning
confidence: 99%
“…Building on this momentum, we proposed in a previous paper [9] architecture and design of a middleware-level framework called virtual repository (VR) for LD-based disaster preparedness and emergency response applications. Despite their commonly acknowledged advantages, adoption of LD and LOD within disaster management IT infrastructures has been slow.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation