Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 1 Why Standards? Campus Perspective Bernard W. Gleason XML Forum Alexandria,

Slides:



Advertisements
Similar presentations
SharePoint in FE What can be achieved Richard Gray 27 March 2009.
Advertisements

Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Distance Learning: A Postsecondary Update John Opper Florida Distance Learning Consortium.
Inter-Institutional Registration UNC Cause December 4, 2007.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Funding for Cyberinfrastructure What has worked at Minnesota? What doesn’t work? What are we doing to move forward?
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
E-business Infrastructure
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Virtual Meetings Increasing Collaboration While Reducing Costs and Ensuring Business Continuity Ram Narayanaswamy CTO 8x8, Inc.
Cloud Usability Framework
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
PLUG IT IN 4 Cloud Computing. 1.Introduction 2.What Is Cloud Computing? 3.Different Types of Clouds 4.Cloud Computing Services 5.The Benefits of Cloud.
The Internetworked E-Business Enterprise
3 Cloud Computing.
Technology Guide Three Cloud Computing. Plug IT In OUTLINE TG 3.1 Introduction TG 3.2 What Is Cloud Computing? TG 3.3 Different Types of Clouds TG 3.4.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
Developments and challenges in authentication and authorisation Klaas Wierenga Berlin, 23 May 2006.
CI Days: Planning Your Campus Cyberinfrastructure Strategy Russ Hobby, Internet2 Internet2 Member Meeting 9 October 2007.
ISECON 2001 The PeopleSoft On Campus Program Implementation Into An Information Systems Curriculum.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Shibboleth at Columbia Update David Millman R&D July ’05
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
It Takes a Village to Raise an Integrated System Marianne Colgrove Jennie McKee Nora McLaughlin Reed College
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Middleware Camp NMI (NSF Middleware Initiative) Program Director Alan Blatecky Advanced Networking Infrastructure and Research.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Security Awareness – Essential Part of Security Management Ilze Murane.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
Supporting education and research The JISC Core Middleware Call Brian Gilmore The University of Edinburgh and JISC Committee for Support of Research.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
Information Technology Assessment Findings Presented to the colleges of the State Center Community College District.
Why Privacy & Security Awareness Training?. Why is privacy & security awareness training required?
1 Identities and Federation: The Next IT Wave (The Canadian Access Federation) Rick Bunt President The Canadian University Council of CIOs (CUCCIO)
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Information Technology  © 2001 The Trustees of Boston College   Slide 1 Call to Action! Bernard W. Gleason JA-SIG uPortal Conference Vancouver, British.
Tom Barton, Senior Director for Integration, University of Chicago
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
State of e-Authentication in Higher Education Bernie Gleason
What ACS Can Do For Me?
3 Cloud Computing.
What ACS Can Do For Me?.
The JISC Core Middleware Call
Presentation transcript:

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 1 Why Standards? Campus Perspective Bernard W. Gleason XML Forum Alexandria, VA May 8, 2003

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 2 Executive Concerns  Return on investment and expanding budgets  Recreational use of network and de-personalization  Slow adoption of technology in instruction  Limited fiscal resources to train and support faculty & staff  Containment of “out of the blue” & spiraling licensing costs  Viruses, spam, hacks, identity theft, music downloads  Inter-institutional collaboration and resource sharing

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 3 Collaboration and Resource Sharing “It seems to me that we can’t do it alone and that progress, or may be even survival, might be dependent on collaborating and sharing resources with other institutions. It doesn’t make sense for every institution, big and small, to be duplicating resources and services.” Quote from the President of a small college

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 4 Middleware Middleware is the collection of software standards that will facilitate the secure, private, transparent and real- time interconnection of distributed people and applications and the exchange of information over the Internet.

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 5 Elements of Middleware  Identity Management & Directory Services  Data Interchange  Single Sign On & Transitive Trust  Security and Privacy  Web services

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 6 Personal Observations  Extended Campus and New Trust Relationships

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 7 Trust Relationships Scenarios  Transitive Trust  Portal Model  Liberty Alliance  Trusted Intermediary  Internet2 Shibboleth

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 8 Transitive Trust

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 9 Portal Model

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 10 Liberty Alliance My customer number 123 is your customer number 789

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 11 Trusted Intermediary

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 12 Internet2 - Shibboleth Uses institutional credentials Supports anonymity User-determined release of data (privacy) Home directory authentication & authorization

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 13 Personal Observations  Extended Campus and New Trust Relationships  Grid Computing  Mobile and external access may exceed on-campus traffic  Privacy on an equal level security  Open Source and Open Standards

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 14 Personal Observations  Virtual Enterprise Applications  Vertical and Specialized Applications  Service Providers and Intermediaries  Universal Identity  Web Services Architecture

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 15 How, When, What?  Maturation of Standards  Demonstrations of new business and trust models  Recognition of fiscal and functional advantages  Compliance with mandated policies and regulations  Commitment to improved convenience to customers  Demand from inspired and influential group of colleges

Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 16 Questions ?