BE 25 – BEinEIMRT Demo CESGA - UVIGO - USC - CHUS - UCM Araceli Gago Arias, Daniel A. Rodríguez Silva University of Santiago, University of Vigo

Slides:



Advertisements
Similar presentations
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Advertisements

Contrail and Federated Identity Management
CGW 2009 Vine Toolkit A uniform access and portal solution to existing grid middleware services P.Dziubecki, T.Kuczynski, K.Kurowski, D.Szejnfeld, D.Tarnawczyk,
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
E-IMRT User’s GUIDE Version /02/23. Contents Welcome window & login Commissioning Tomograph management Creating a new treatment Launching a verification.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Make Secure Information Sharing (SIS) Easy and an Reality C. Edward Chow, PI Osama Khaleel Bill Kretschmer C. Edward Chow, PI Osama Khaleel Bill Kretschmer.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
11 DICOM Image Communication in Globus-Based Medical Grids Michal Vossberg, Thomas Tolxdorff, Associate Member, IEEE, and Dagmar Krefting Ting-Wei, Chen.
Integration of Applications MIS3502: Application Integration and Evaluation Paul Weinberg Adapted from material by Arnold Kurtz, David.
Understanding and Managing WebSphere V5
Chapter 11: Dial-Up Connectivity in Remote Access Designs
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Clinic Security and Policy Enforcement in Windows Server 2008.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
1 Autonomic Computing An Introduction Guenter Kickinger.
Ganesh Kirti Roger Sullivan Oracle Corporation “This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
DISTRIBUTED COMPUTING
Exploitation Plan for BE25 BEinEIMRT CESGA June 2009.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Fundamentals of Database Chapter 7 Database Technologies.
ASG - Towards the Adaptive Semantic Services Enterprise Harald Meyer WWW Service Composition with Semantic Web Services
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
X-Road – Estonian Interoperability Platform
Module 11: Remote Access Fundamentals
AMPol-Q: Adaptive Middleware Policy to support QoS Raja Afandi, Jianqing Zhang, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Tool Integration with Data and Computation Grid GWE - “Grid Wizard Enterprise”
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Yuhui Chen; Romanovsky, A.; IT Professional Volume 10, Issue 3, May-June 2008 Page(s): Digital Object Identifier /MITP Improving.
Windows Role-Based Access Control Longhorn Update
Microsoft Management Seminar Series SMS 2003 Change Management.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
BE 25 – BEinEIMRT CESGA - UVIGO – USC – CHUS - UCM Andres Gomez CESGA
Teamplay Connect, compare, collaborate.
How to Set Up a System for Teaching Files, Conferences, and Clinical Trials Medical Imaging Resource Center.
International Symposium on Grid Computing (ISGC-07), Taipei - March 26-29, 2007 Of 16 1 A Novel Grid Resource Broker Cum Meta Scheduler - Asvija B System.
Timeshared Parallel Machines Need resource management Need resource management Shrink and expand individual jobs to available sets of processors Shrink.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Tool Integration with Data and Computation Grid “Grid Wizard 2”
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Module 1: Introduction to Microsoft SQL Server Reporting Services
ACGT Architecture and Grid Infrastructure Juliusz Pukacki ‏ EGEE Conference Budapest, 4 October 2007.
Enabling Grids for E-sciencE LRMN ThIS on the Grid Sorina CAMARASU.
CTTI PROJECT Emory University, Quality Assurance and Review Center (QARC) and Washington University in St. Louis.
Daniele Lezzi Execution of scientific workflows on federated multi-cloud infrastructures IBERGrid Madrid, 20 September 2013.
ETRIKS Platform for bioinformatics ISGC 17/03/15 Pengfei Liu, CC-IN2P3/CNRS.
Copyright © 2006, Oracle. All rights reserved Oracle Web Services Manager.
Open Source distributed document DB for an enterprise
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Similarities between Grid-enabled Medical and Engineering Applications
Cloud Management Mechanisms
Security & .NET 12/1/2018.
Presentation transcript:

BE 25 – BEinEIMRT Demo CESGA - UVIGO - USC - CHUS - UCM Araceli Gago Arias, Daniel A. Rodríguez Silva University of Santiago, University of Vigo

Business Experiments in GRID 2 Outline General scenario overview Demonstration architecture Demonstration scenario Live demo Technical innovation Demonstrated use of Grid Validation of AC1 components Conclusion

Business Experiments in GRID 3 - In 2000 more than 6.2 million deaths in the world - 15 million in 2020 (WHO forecast ) - In Europe: 3 million new patients per year million deaths - BUT: Cancer can be cured in many cases General scenario overview

Business Experiments in GRID 4 Chemotherapy Surgery Radiotherapy How to fight cancer >60 % of patients >60 % of patients

Business Experiments in GRID 5 Computed Tomography (CT) Tumor Radiotherapy Depth dose profile Tumor control and complications probability Dose deposition in patient on CT image

Business Experiments in GRID 6 TREATMENT PLANNING SYSTEMS USED TO DESIGN TREATMENTS DOSE ALGORITHMS FastFast Limited accuracyLimited accuracy Treatment Planning Systems (TPS)

Business Experiments in GRID 7 VAST COMPUTATIONAL RESOURCES VIA WEB ACCURATE DOSE ALGORITHMS What can BEinEIMRT do for radiotherapy? Monte Carlo Simulation

Business Experiments in GRID 8 General scenario overview Hospital staff Patient’s Treatment Information Patient’s Treatment Information Hospital TPS Hospital TPS TreatmentRadiationPlanTreatmentRadiationPlan BEinEIMRT Services Patient Verify treatment plans Calculate optimal treaments Verify treatment plans Calculate optimal treaments DICOM

Business Experiments in GRID 9 Main features of e-IMRT platform Treatment verification –Very accurate dose calculation (Monte Carlo) –Grid reduces the response time –Realistic dose simulation in affordable time Searching of optimal treatment solutions –Prescriptions: organs to spare & regions to treat –Many possible solutions fulfilling prescriptions –Set of optimal solutions in affordable time

Business Experiments in GRID 10 Architecture of the demo Service-Oriented Architecture (SOA) –Based on Web Services (WS) Client Web Portal User roles: –Hospital user –Hospital administrator –System administrator SLA Negotiation Services security: PEP + PDP Hospital TREATMENT SERVICES (WS) LOCAL COMPUTING RESOURCES 3rd PARTY COMPUTING RESOURCES 3rd PARTY COMPUTING RESOURCES INTERNET GRID WEB SERVER SLA PEP PDP PEP PDP DB

Business Experiments in GRID 11 Security Components: securing WS Secure data exchange: confidentiality, privacy, and integrity All requests pass through the PEP/PDP security software PEP – Policy Enforcement Point –Vordel’s XML Gateway with BEinGRID enhancements –Protect Web Services from wide range of attacks –Intercepts and processes all incoming requests –Policy-based, centralized control –Secure service virtualization, contextualization, and exposure –Calls out to PDP for authorization request PDP – Policy Decision Point –Axiomatics’ Authorization Service with BEinGRID enhancements –Checks access control requests against its access control policies –Network-hosted: easy to integrate with other solutions e.g. the PEP –Constrained delegated administration of access control policies Validate BEinGRID’s General Security common capabilities

Business Experiments in GRID 12 PEP-PDP interaction

Business Experiments in GRID 13 Management of Grid Resources GridWay Middleware –Submits jobs to Grid resources and monitors them –Requires specific plug-in to work with BE25 SLA Negotiator –Automatically contracts external resources as needed. –Integrated with GridWay –Component from BEinGRID’s SLA cluster Other implemented features –Monitoring of SLA –Accounting of SLA

Business Experiments in GRID 14 SLA Negotiation overview GRIDWAY TREATMENT SERVICES SLA DRMAA SLA Negotiator client SLA Negotiator client SLA Negotiator server GRID EXTERNAL RESOURCES PROVIDER

Business Experiments in GRID 15 SLA components interaction Provider List Pre SLA Broker GW-SLA GW Internal Struct SLA Negotiator client SLA Negotiator client SLA Evaluation SLA Negotiator server Plugin GW-SLA DB Services GRIDWAY Resources provider

Business Experiments in GRID 16 Demonstration scenario Web portal: –Internet browser, any operating system –Java plugin + Flash plugin required (common plugins) SLA negotiation –Admin configuration web page for SLA –Console to check the automatic SLA negotiation Security components –PEP real time monitoring to display blocked and accepted requests –PEP administrator to show Gateway’s policies –Console to monitor the PDP traces

Business Experiments in GRID 17 Live demonstration

Business Experiments in GRID 18 Technical innovation New service for IMRT virtual verification New service for treatment plan optimization 3D gamma maps in minutes Web-based front-end to facilitate the access from hospitals Based on Web Services  easy integration with local TPS Hides computing resources: GridWay+SLAs Service-Oriented security: PEP+PDP integration

Business Experiments in GRID 19 Demonstrated use of Grid Reduces the time to obtain results –The results can be produced on time thanks to the aggregation of computing resources Reduces computing entry investments –The new company only has to buy the front- ends. The computing resources can be provisioned on demand Increases the flexibility –The available computing resources can be adapted to the demand dynamically

Business Experiments in GRID 20 Validation of AC1 components SLA-Negotiation validation –Successfully integrated with GridWay Some additions were needed Allows to add available resources on demand –Validated benefits of using SLA Negotiation Execution time decreases using SLA Negotiation Verification: Execution Time < 5 hours Optimization: Execution time < 2 hours

Business Experiments in GRID 21 Security validation Global security has been improved, hospital data is exchanged safely Anonymization and HTTPS complement Web Services security Validation of AC1 components

Business Experiments in GRID 22 PEP+PDP validation –Policy Enforcement Point (PEP) validation SSL: communication from hospitals to GW and from GW to Services is encrypted Protection against different attacks and bad-formed requests Extensible security gateway: integration with PDP for fine-grained access control –Policy Decision Point (PDP) validation Encryption and digital signatures are used between PEP and PDP Authorization: PEP validates access control requests against PDP policies –Components successfully integrated increasing the security of the services Validation of AC1 components

Business Experiments in GRID 23 Conclusions The proof of concept has been successfully demonstrated Grid reduces the time to obtain results significantly Web portal allows easy, flexible access to services There is room for some improvement in the treatment optimization tool SLA tools provided by BEinGRID’s SLA cluster have been improved Distributed architecture calls for new security mechanisms  Successful integration of those provided by BEinGRID’s General Security cluster

THANK YOU Any questions? © BEinGRID Consortium