PALMS-CI: A Policy-driven Cyberinfrastructure For the Exposure Biology Community Barry Demchak Jacqueline Kerr, Gregory Norman, Ernesto.

Slides:



Advertisements
Similar presentations
GRADD: Scientific Workflows. Scientific Workflow E. Science laboris Workflows are the new rock and roll of eScience Machinery for coordinating the execution.
Advertisements

Using UML, Patterns, and Java Object-Oriented Software Engineering Chapter 1: Introduction.
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
ARCH-05 Application Prophecy UML 101 Peter Varhol Principal Product Manager.
Applying the SOA RA Utah Public Safety ESB Project Utah Department of Technology Services April 10, 2008 Prepared by Robert Woolley.
Professor John Hosking, Dean of Engineering and Computer Science Models, Modelling, MBSE.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
WebRatio BPM: a Tool for Design and Deployment of Business Processes on the Web Stefano Butti, Marco Brambilla, Piero Fraternali Web Models Srl, Italy.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Modeling Process-Oriented Integration of Services Using Patterns and Pattern Primitives Uwe Zdun and Schahram Dustdar Distributed Systems Group Institute.
Introduction To System Analysis and Design
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
L4-1-S1 UML Overview © M.E. Fayad SJSU -- CmpE Software Architectures Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I.
WebRatio BPM: a Tool for Design and Deployment of Business Processes on the Web Stefano Butti, Marco Brambilla, Piero Fraternali Web Models Srl, Italy.
Wireless Sensor Network Security Anuj Nagar CS 590.
1. Context: Ambient Intelligence Ambient Intelligence (AmI) represents a vision of ubiquitous computing, sensing and actuating to unobtrusively enhance.
An Introduction to Software Engineering
Basic Concepts The Unified Modeling Language (UML) SYSC System Analysis and Design.
Model Driven Security Framework for Definition of Security Requirements for SOA Based Applications Authors: Muhammad Qaisar Saleem, Jafreezal Jaafar, and.
Scientific Data Infrastructure in CAS Dr. Jianhui Scientific Data Center Computer Network Information Center Chinese Academy of Sciences.
Abstract A software development life cycle can be divided into requirements elicitation, specification, design, implementation, testing, and maintenance.
Friday October 28, 2005 SoBeNeT workshop The role of Security in software processes (UP, XP) and software architecture.
CSCE 548 Secure Software Development Security Use Cases.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Requirements Engineering Processes l Processes used to discover, analyse and.
OASIS WSQM TC Meeting Dugki Min. 컴퓨터공학부 건국대학교 Agenda 1. Roll Call 2. Review and approval of the agenda 3. Review and approval of the previous.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Assessing the Suitability of UML for Modeling Software Architectures Nenad Medvidovic Computer Science Department University of Southern California Los.
Modeling Dynamic Role- based Access Constraints using UML Khaled Alghathbar George Mason University, USA and King Saud University, Riyadh, Saudi Arabia.
Requirements Engineering Requirements Elicitation Process Lecture-8.
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY Nathan Kerr Pictures and Research.
CDL-Flex Empirical Research
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
June 05 David A. Gaitros Jean Muhammad Introduction to OOD and UML Dr. Jean Muhammad.
Modeling Shari L. Pfleeger and Joanne M. Atlee, Software Engineering: Theory and Practice, 4 th edition, Prentice Hall, Hans Van Vliet, Software.
1 Introduction to Software Engineering Lecture 1.
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
Unified Modeling Language* Keng Siau University of Nebraska-Lincoln *Adapted from “Software Architecture and the UML” by Grady Booch.
UML Use Case Diagramming Guidelines. What is UML? The Unified Modeling Language (UML) is a standard language for specifying, visualizing, constructing,
Program Development Cycle Modern software developers base many of their techniques on traditional approaches to mathematical problem solving. One such.
OOI CyberInfrastructure Workshop: Ocean Observation Programs Preparation Phone Meeting May 5, 2008 Alan Chave, Michael Meisinger OOI CI System Engineering.
 What is Modeling What is Modeling  Why do we Model Why do we Model  Models in OMT Models in OMT  Principles of Modeling Principles of Modeling 
OOI CyberInfrastructure: Data Management Architecture Specification Workshop June 30-July 1, 2008 Matthew Arrott, Ingolf Krueger, Claudiu Farcas, Emilia.
CEN5011, Fall CEN5011 Software Engineering Dr. Yi Deng ECS359, (305)
SOA-25: Data Distribution Solutions Using DataXtend ® Semantic Integrator for Sonic ™ ESB Users Jim Barton Solution Architect.
Object-Oriented Software Engineering using Java, Patterns &UML. Presented by: E.S. Mbokane Department of System Development Faculty of ICT Tshwane University.
Streamflow - Programming Model for Data Streaming in Scientific Workflows Chathura Herath.
Basic Concepts of Component- Based Software Development (CBSD) Model-Based Programming and Verification.
PALMS-CI: A Policy-driven Cyberinfrastructure For the Exposure Biology Community Barry Demchak and Ingolf California.
Technical Support to SOA Governance E-Government Conference May 1-2, 2008 John Salasin, Ph.D. DARPA
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
Ocean Observatories Initiative OOI Cyberinfrastructure Life Cycle Objectives Milestone Review, Release 1 San Diego, CA February 23-25, 2010.
Applying Aspect-Orientation in Designing Security Systems Shu Gao Florida International University Center for Advanced Distributed Systems Engineering.
Ocean Observatories Initiative Serving Ocean Model Data on the Cloud M. Meisinger, C. Farcas, E. Farcas, C. Alexander, M. Arrott, J. de La Beaujardière,
Yu, et al.’s “A Model-Driven Development Framework for Enterprise Web Services” In proceedings of the 10 th IEEE Intl Enterprise Distributed Object Computing.
Ocean Observatories Initiative Integrating Marine Observatories into a System-of-Systems: Messaging in the US Ocean Observatories Initiative M. Arrott,
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
National Aeronautics and Space Administration Jet Propulsion Laboratory March 17, 2009 Workflow Orchestration: Conducting Science Efficiently on the Grid.
 The processes used for RE vary widely depending on the application domain, the people involved and the organisation developing the requirements.  However,
Adding Fault Tolerance to Service Oriented Architecture Ingrid Buckley 02/19/09.
Lasse Pajunen Nokia Research Center Nokia Corporation Anna Ruokonen Institute of Software Systems Tampere University of Technology ICWS 2007 Modeling and.
Software Development Framework
Object-Oriented Software Engineering Using UML, Patterns, and Java,
Design Patterns Damian Gordon.
World-Leading Research with Real-World Impact!
Classical Waterfall Model
Automated Analysis and Code Generation for Domain-Specific Models
Subject Name: SOFTWARE ENGINEERING Subject Code:10IS51
UML Design for an Automated Registration System
Presentation transcript:

PALMS-CI: A Policy-driven Cyberinfrastructure For the Exposure Biology Community Barry Demchak Jacqueline Kerr, Gregory Norman, Ernesto Ramirez, Fred Raab, Dane Lotspeich, Ingolf Krüger, and Kevin California Institute for Telecommunications and Information Technology, San Diego Division The Problem Build Cyberinfrastructures (CI) † to serve stakeholder communities Support research workflows Workflows are templates to be customized by stakeholders Traditional development cycles are long & mis-target stakeholder concerns Healthy CIs solve all requirements simultaneously & continuously Solve Stakeholder Concerns Support emerging workflows Multifactor access control Confidentiality & privacy (HIPAA/IRB) High availability & reliability Scalability (bandwidth/storage/users) Auditability Provenance & curation Challenges Requirement elicitation Functional & quality requirements Crosscutting concerns Precise & accurate formulation Enactment Low latency to implementation Faithful to original requirement Conflict & error detection Scalable to large data flows End-to-end Traceability The Solution Model-based Policy Elicitation Stakeholders specify policies directly 1,2 on workflow models (UML Activity Diagrams 4 ) using visual Domain Specific Language (DSL 5 ) Policies specify alternate workflows & data flow transformations Cross-pollination of other requirement domains Service Oriented Architecture logical/deployment models Leverage standard patterns 3 : strategy, messaging, routing, & composite pattern (i.e., systems-of- systems) Leverage role-based interaction, choreography, & interceptor techniques Future Work Policy Concerns Expand repertoire of policy patterns Define policy composition rules Code generation and deployment Conflict/completeness checking Scalable and distributed execution Domain Specific Language Leverage relationships with other visual notations (e.g., Business Process Modeling Notation) Alignment with additional policy patterns & domains This material is based upon work supported by the National Institutes of Health under Grant No 1U01CA and the National Science Foundation under Grant No CCF f † Cyberinfrastructures (CI) f f PALMSReferences Physical Activity Location Measurement System to understand where activity-related energy expenditure occurs in humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides framework for research and analysis, and has ultimate goal of discovering methods for engineering better health. An Internet-based research computing environment that supports data acquisition, data storage, data management, data integration, data mining, data visualization, and other computing and information processing services. Different stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else the integrity of the CI degrades. 1.J. Juerjens. Security Systems Development with UML. Springer-Verlag Berlin Heidelberg, T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proceedings of the 5 th International Conference on The Unified Modeling Language. pp Springer Verlag, M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. Krüger, and M. Menarini. Rich Services: The Integration Piece of the SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul. 2007, pp A. Bhattacharjee and R. Shyamasundar. Activity Diagrams: A Formal Framework to Model Business Processes and Code Generation. Journal of Object Technology. Vol 8, No 1, Jan J. Viega. Building security requirements with CLASP. Proceedings of the 2005 Workshop on Software Engineering for Secure Systems – Building Trustworthy Applications. St Louis, MO, PALMS Cyberinfrastructure Sensor Data PALMS Browser Stakeholder Policies Shared Data