IAB-Feb 04 1 TAPAS Progress Report (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University.

Slides:



Advertisements
Similar presentations
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Advertisements

Contracts, Service Level Agreements and Virtual Enterprises in Composite Services Carlos Molina-Jimenez (
TAPASDelivMarch04 1 TAPAS Deliverables for March 04 (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University.
Basic Concepts in Component-Based Software Engineering
Approaches to EJB Replication. Overview J2EE architecture –EJB, components, services Replication –Clustering, container, application Conclusions –Advantages.
OASIS Reference Model for Service Oriented Architecture 1.0
Applied Cryptography for Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Trusted Coordination ADAPT Workshop, December 03 1 Building Blocks for Trusted Coordination (a status report from the TAPAS project) Santosh Shrivastava.
Microsoft Desktop Virtualization Migrating to Windows 7 With MED-V.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
TAPAS WP1 – Application Service Requirements and Specification.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 31 Slide 1 Service-centric Software Engineering 2.
FMEA-technique of Web Services Analysis and Dependability Ensuring Anatoliy Gorbenko Vyacheslav Kharchenko Olga Tarasyuk National Aerospace University.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
E-Science Meeting April Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
E-Science Meeting March Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
Service Transition & Planning Service Validation & Testing
By Xiangzhe Li Thanh Nguyen.  Introduction  Terminology  Architecture  Component  Connector  Configuration  Architectural Style  Architectural.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
0 The Virtual Resource Market – SLAs as derivatives contracts for the data centre Date: 8 May 2007 Produced by: Chris Swan The materials may not be used.
Component frameworks Roy Kensmil. Historical trens in software development. ABSTRACT INTERACTIONS COMPONENT BUS COMPONENT GLUE THIRD-PARTY BINDING.
TAPAS meeting Application Hosting Requirements adesso AG Werner Beckmann
Rob Smith April 21, /18 GOLD Project Update Meeting GOLD an infrastructural approach to virtual organisations.
A Secure JBoss Platform Nicola Mezzetti Acknowledgments: F. Panzieri.
Newcastle upon Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Bologna, September 2003 Giovanna Ferrari School of Computing Science University of Newcastle.
Notes from Coulouris 5Ed Distributed Systems Notes on Components.
Dortmund, February 2003 Giorgia Lodi Department of Computer Science University of Bologna A.Amoroso,V.Ghini,
1 The Virtual Enterprise Model Carlos Molina-Jimenez TAPAS meeting, Dortmund th Feb 2003.
adesso AG 2004 TAPAS IAB meeting 1 TAPAS meeting Evaluation approach for TAPAS adesso AG Werner Beckmann
Slide 1 Service-centric Software Engineering. Slide 2 Objectives To explain the notion of a reusable service, based on web service standards, that provides.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
Quality Assurance. Define Quality (product & service) Exceeds the requirements of the customer. General excellence of standard or level. A product which.
1 An abstract model for run-time monitoring and enforcement of contracts. Carlos Molina-Jimenez TAPAS.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
B2BObjectsDSN, Washington, June Distributed Object Middleware to Support Dependable Information Sharing between Organisations Nick Cook, Santosh.
Contracts, SLAs and Virtual Enterprises Carlos Molina-Jimenez ( Meeting of TAPAS partners at University.
Trusted CoordinationTAPAS Workshop, 25-26/09/031 Building Blocks for Trusted Coordination Nick Cook University of Newcastle.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Issues in Cloud Computing. Agenda Issues in Inter-cloud, environments  QoS, Monitoirng Load balancing  Dynamic configuration  Resource optimization.
Dr. Ir. Yeffry Handoko Putra
Presented by Edith Ngai MPhil Term 3 Presentation
Review of new Question descriptions under ITU-T SG11
Prototyping in the software process
Roles and Boundaries – 1/2
Software Prototyping.
Klara Nahrstedt Spring 2009
Distribution and components
Service Organization Control (SOC)
Gestione di Service Level Agreements (SLA) in sistemi Grid
Service level Agreements
Grid Computing B.Ramamurthy 9/22/2018 B.Ramamurthy.
Cloud Testing Shilpi Chugh.
Borderless Networks Services Supported
Service-centric Software Engineering
Software Connectors.
Fundamental Concepts and Models
Task Force on Target Setting and Reporting TFTSR
The Anatomy and The Physiology of the Grid
NIST Cloud Computing Reference Architecture
The Anatomy and The Physiology of the Grid
On the Use of Service Level Agreements in AssessGrid
Quality-aware Middleware
Cryptography and Network Security
Security Mechanisms Network Security.
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

IAB-Feb 04 1 TAPAS Progress Report (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University

IAB-Feb 04 2 March 04 Deliverables D3: Service composition and analysis (report) –UCL: done (Sept 03 was the deadline) –To be discussed today D8: Container for group communication –Really about QoS enabled group communication (Camb, Ncl) –Software deliverable (open source) D9: Container for trusted coordination –Really about regulating interactions between organisations (Ncl) –Software deliverable (open source) D10: Container for QoS monitoring –Really about SLA monitoring (Bologna, Ncl) – Software deliverable (open source)

IAB-Feb 04 3 March 04 Deliverables (contd.) D13: Second year evaluation and assessment report –Work towards auction system hosting –Adesso Some management related reports..

IAB-Feb 04 4 TAPAS Architecture ASP should be capable of hosting Virtual Enterprises (VEs) –Distributed applications involving cross organisation interactions A key problem in VE management is how enterprises can regulate access to their resources by other enterprises –Enterprises within a VE will therefore require their interactions with one another other to be strictly controlled and policed. –there will be a clear need among all parties to embark upon their business relationships underpinned by guarded trust management procedures. –Need explicit ways of representing contracts and SLAs and ensuring that organisational interactions follow what is stated in a contract and the services meet the QoS properties stated in SLAs

IAB-Feb 04 5 TAPAS Architecture TAPAS Architecture: shaded entities make all the difference

IAB-Feb 04 6 TAPAS Architecture QoS Enabled Application Server –The QoS management, monitoring and adaptation layer is intended to make the underlying application server QoS enabled. –two principal middleware services, named Configuration Service and Controller Service –QoS requirements of hosted applications as stated in SLAs will be specified using SLAng –SLAng specification will be used for initialising various QoS related configuration information required by the configuration service of the application server, through the deployment descriptors –To be discussed later today (Bologna)

IAB-Feb 04 7 TAPAS Architecture D8: QoS enabled group communication –Developed a novel, adaptive multicast protocol

IAB-Feb 04 8 TAPAS Architecture D9: trusted coordination –Inter-Organisation Interaction regulation subsystem –Trust achieved through regulation »We assume that interacting entities cannot simply rely on the trust they have in one another. »To be of practical use, such trust relationships must be managed and observed »Because of this, interacting parties must resort to mechanisms that guarantee the rights and obligations that each interacting entity promises to honour. »In the worst case, violations of agreed interactions are detected and notified to all interested parties an audit trail of all interactions will need to be maintained –Two level mechanism: »Contract management (rights and obligations) using FSMs + RBAC »Infrastructure support for non-repudiable interactions Implementing novel mechanisms in J2EE server (Jboss).

IAB-Feb 04 9 TAPAS Architecture D10: QoS monitoring –QoS Monitoring and Violation Detection subsystem »Several of the rights and obligations in SLAs in a contract refer to the quality of service (e.g., service availability, performance guarantees). »interacting entities cannot simply rely on the trust they have in one another and assume that QoS levels are being honoured. »a service provider must be able to demonstrate that the offered service meets the QoS levels promised to service users »hosted applications and services need to be instrumented with appropriate sensors for measuring QoS parameters »The parties involved must also agree on the QoS evaluation techniques (calculation procedures to be used)

IAB-Feb TAPAS Architecture »These details need to be encoded in some way in the SLAng specification language. »SLAng specification can be used for configuring the monitoring and violation detection service. –Monitoring and Violation Detection subsystem could be a third party service –Architecture to be discussed later today

IAB-Feb TAPAS Architecture Working on auction application –To be discussed today