Home Up

 

 

Pointers to Knowledge

The Concept of Pointers With Respect To Orders Of Sensitive Compartmented Knowledge

By Roy D. Follendore III

Copyright (c) 2001 RDFollendoreIII

ALL RIGHTS RESERVED

 

Compartmented knowledge sensitivity must be defined in context as a specific relationship between data to information, and information with respect to time.  Moreover the sensitivity of compartmented knowledge is relative to external contextual relationships.  These relationships are a matter of perspective and have been difficult to understand and manage.  The complexity of compartmented knowledge management is directly related to the ability to identify perspectives, as well as to specify, track internal and external associations to knowledge.  These associations are called pointers.  

Pointers can be essentially conceptualized as associative objects that come in many flavors.  First order pointers provide absolute and direct associations. ( Example: A=>B or A is associated to B.) Second order pointers however are indirect references to associations.  This result is essentially a basic form of set theory notation, and in this particular case represents the associated second order expressions of inclusive data and information values.  (Example: A=>B=>C, therefore A=>C), or A is associated with B which is associated with C.  Therefore A is associated with C.   Of course these are primitive examples.  More complex examples might include for example, (A[a,b,c...]=>B[x,y,z...]=>C) where A is representative and part of set  a, b, c... and is associated with B which is representative and a part of set  x, y, z... all of which is represented directly or indirectly as an association of C.  Therefore (A[a,b,c...]=>C indirectly) and (B[x,y,z...]=>C directly such that  ((B[x,y,z...])((A[a,b,c...]) =>C) or (B(A)=>C).     This form of association requires external pointers to manage.  The symbolic representative association of "[a,b,c...]" by "A" is external, while "A" is an indirect internal representation as part of the "A[a,b,c...] set" by "C".              

The computer is essentially a machine that manipulates pointers through computations.  It follows that  it is also a compartmented knowledge processor.  It traditionally does this through explicit arrangements of pointers that are standardized.  The standard ASCII character set is such a standard.  Every possible expressed character on a screen is symbolically represented in a number of dynamically logical and spatial dimensions through this standard.  Within what I call the concept of Cryptocommunications the overall objective of cryptography is not primarily to "secure" data, it is intended to improve the performance of the dissemination of knowledge.  Within Cryptocommunications, importance of this kind of set notation is track representation which can then used to manage content.

One way Cryptocommunications accomplishes this through a dynamic classification permutation of the representation.  If for instance internally (A[a,b,c...]=>B[x,y,z...]=>C) then externally ( (A[a,b,c...]=>B[x,y,z...]=>C)j) =>Cjn (where n of j is an object oriented cryptographic key variable).  The essential difference between this and the previous example is that this third order representation of content of Cx can be both logically and rationally, independently isolated secured and managed for the entire lifecycle.  While the control of content is kept as an integral part of each knowledge particle, the power that this architecture provides is that of virtual private content management, rather than virtual private networking.  In other words, connectivity can be authentically managed through content control, as opposed to trying to manage content through connectivity.       

 

 

.

Copyright (c) 2001-2007 RDFollendoreIII All Rights Reserved