PALMS-CI: A Policy-driven Cyberinfrastructure For the Exposure Biology Community Barry Demchak and Ingolf California.

Slides:



Advertisements
Similar presentations
The e-Framework Bill Olivier Director Development, Systems and Technology JISC.
Advertisements

Service Oriented Architecture for Mobile Applications Swarupsingh Baran University of North Carolina Charlotte.
SLA-Oriented Resource Provisioning for Cloud Computing
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Applying the SOA RA Utah Public Safety ESB Project Utah Department of Technology Services April 10, 2008 Prepared by Robert Woolley.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
Cloud Testing – Guidelines and Approach. Agenda Understanding “The Cloud”? Why move to Cloud? Testing Philosophy Challenges Guidelines to select a Cloud.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Software Engineering Techniques for the Development of System of Systems Seminar of “Component Base Software Engineering” course By : Marzieh Khalouzadeh.
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
Azad Madni Professor Director, SAE Program Viterbi School of Engineering Platform-based Engineering: Rapid, Risk-mitigated Development.
Improving Robustness in Distributed Systems Jeremy Russell Software Engineering Honours Project.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
NASA World Wind. What is NASA World Wind? A richly interactive 3D planetary visualization tool. Smart client architecture. Portal for NASA data. Integrates.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
1. Context: Ambient Intelligence Ambient Intelligence (AmI) represents a vision of ubiquitous computing, sensing and actuating to unobtrusively enhance.
OASIS E-Government Technical Committee Meeting Washington, DC July 27, 2004 Service-Oriented Architectures: Enabling Agility for Governments Joseph M.
95-843: Service Oriented Architecture 1 Master of Information System Management Service Oriented Architecture Oracle SOA Suite 11g.
Effectively and Securely Using the Cloud Computing Paradigm.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
C LOUD C OMPUTING OPEN ARCHITECTURE BY L IANG -J IE Z HANG AND Q UN Z HOU presented by: Raghu N Avula.
Optimize your Open Data 5 Best Practices for Designing Data-Driven Apps ​ Glenn Hess ​ Federal Sales Engineer ​ Actuate, Inc.
PALMS-CI: A Policy-driven Cyberinfrastructure For the Exposure Biology Community Barry Demchak Jacqueline Kerr, Gregory Norman, Ernesto.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
CONTENTS Arrival Characters Definition Merits Chararterstics Workflows Wfms Workflow engine Workflows levels & categories.
Ocean Observatories Initiative Common Execution Infrastructure (CEI) Overview Michael Meisinger September 29, 2009.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Background - Scenario Drivers and Critical Issues with a Focus on Technology Trends, and Systems Architecture Near-Shore-Development Seminar Barry Demchak.
Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger September 29, 2009.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Why Governance? SOA Governance allows to n Master complexity of IT n Support business process change.
 Apache Airavata Architecture Overview Shameera Rathnayaka Graduate Assistant Science Gateways Group Indiana University 07/27/2015.
1 Computing Challenges for the Square Kilometre Array Mathai Joseph & Harrick Vin Tata Research Development & Design Centre Pune, India CHEP Mumbai 16.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Sponsored by the National Science Foundation A New Approach for Using Web Services, Grids and Virtual Organizations in Mesoscale Meteorology.
Cyberinfrastructure What is it? Russ Hobby Internet2 Joint Techs, 18 July 2007.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Align Business and Information Technology – with SOA Pradeep Nair Director – Software Group (IBM India/SA)
Chad Collins CEO Henry Chan CTO In Latin, nubifer means “bringing the clouds”
Technical Support to SOA Governance E-Government Conference May 1-2, 2008 John Salasin, Ph.D. DARPA
Identity Management Issues and Needs Grace Agnew, Rutgers University Libraries.
Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.
4/26/2017 Use Cloud-Based Load Testing Service to Find Scale and Performance Bottlenecks Randy Pagels Sr. Developer Technology Specialist © 2012 Microsoft.
Ocean Observatories Initiative OOI Cyberinfrastructure Life Cycle Objectives Milestone Review, Release 1 San Diego, CA February 23-25, 2010.
Digital Data Collections ARL, CNI, CLIR, and DLF Forum October 28, 2005 Washington DC Chris Greer Program Director National Science Foundation.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Data Warehousing Data Mining Privacy. Reading FarkasCSCE Spring
Ocean Observatories Initiative Integrating Marine Observatories into a System-of-Systems: Messaging in the US Ocean Observatories Initiative M. Arrott,
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
Service Oriented Architecture with Microsoft Platform Presenter name: Sandeep Kesiraju Company: Microsoft.
Black and White Introduction to Cyberinfrastructure Eric Shook Department of Geography Kent State University.
Enabling Secure Multi-Organization Collaboration Andrew Porter IT Director, Enterprise Architecture Merck & Co., Inc.
ClearAvenue, LLC Headquartered in Columbia, Maryland
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
World-Leading Research with Real-World Impact!
IS4680 Security Auditing for Compliance
Service Oriented Architecture for Cloud Based Travel Reservation Software as a Service Comp 684 – Rayna Burgess.
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Service Oriented Architecture (SOA)
Presentation transcript:

PALMS-CI: A Policy-driven Cyberinfrastructure For the Exposure Biology Community Barry Demchak and Ingolf California Institute for Telecommunications and Information Technology, San Diego Division Requirements Functional (FRs) Support research workflow Allow multiple investigators & studies Support community contribution of device profiles, calculations, visualizers Share raw data & processed results while maintaining provenance Quality (QRs) Dynamic access control Confidentiality and privacy (HIPAA/IRB) High availability and reliability Scalability (bandwidth/storage/users) Auditability Challenges Early Identification and modelling Stakeholders Quality requirements (QRs) Crosscutting concerns Policy Definition and Execution Agile development process Responsive to changing requirements Future-proof architecture Ease of maintainability and evolution while minimizing risk to operations Rich Services 3 Service Oriented Architecture (SOA) Based on composite pattern (i.e., system-of-systems), messaging pattern, routing pattern, and role- based interactions, choreography Crosscutting concerns (including policy evaluation) as interceptors Agile Development Framework End-to-end model-driven approach Early & continuous identification and prioritization of crosscutting concerns Results Models Use cases, domain models, services Implementation Java-based Enterprise Service Bus Standards-based messaging Storage virtualization based on OSS Inversion of Control creates worker threads on demand Features Rapid incorporation of emergent data sources at low risk to existing users Seamless incorporation of novel intermediary services (e.g., policy) Easy integration w/new clients & CIs Scales easily to high usage while maintaining high performance Future improvements Policy-driven crosscutting concerns (e.g., IA & HIPAA, scaling, failure mitigation, self-configuration) Migration to cloud Functional Requirements (FRs) This material is based upon work supported by the National Institutes of Health under Grant No 1U01CA (Project PALMS: Kevin Patrick, PI) and the National Science Foundation under Grant No CCF f Cyberinfrastructures (CI) 2 f f PALMS f Science encompassing reliable information delivery to intended parties under appropriate circumstances. Defined by National Security Agency (NSA) as information availability, integrity, confidentiality, non-repudiation, and access control. Demanded by all or most CI stakeholders as a condition of participating in the CI. Information Assurance (IA) 1 References Store/organize Collect data Analyze Visualize Physical Activity Location Measurement System to understand where activity-related energy expenditure occurs in humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides framework for research and analysis, and has ultimate goal of discovering methods for engineering better health. An Internet-based research computing environment that supports data acquisition, data storage, data management, data integration, data mining, data visualization, and other computing and information processing services. Different stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else the integrity of the CI degrades. 1. W. McNight. What is Information Assurance? Crosstalk: The Journal of Defense Software Engineering. July Revolutionizing Science and Engineering Through Cyberinfrastructure: Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure. Washington, DC: National Science Foundation, January M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. Krüger, and M. Menarini, Rich Services: The Integration Piece of the SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul. 2007, pp Quality Requirements (QRs) Controlled Access Secure Reliable Reusable Manageable Maintainable Scalable Performant Highly Available High Data Integrity Confidential HIPAA-compliant Auditable Robust Rich Service Development Process Rich Service ArchitecturePALMS Browser