Download presentation
Presentation is loading. Please wait.
Published byLambert Job Rose Modified over 8 years ago
1
How I learnt to trust the GRID Brian Collins Visiting Professor IAM, University of Southampton Vice President, IEE Ex Global CIO Clifford Chance Ex Director of Technology and Chief Scientist, GCHQ
2
IT and Commerce - parameters Global businesses Driven by competition Agility and adaptability are key issues Trusted self, market and customer knowledge and processes are key differentiators Time is money Cultural differences can be strengths and weaknesses
3
Challenges for the GRID Latency and Responsiveness Business process alignment Supply side governance Globalisation of solutions Trustworthiness of services
4
Latency and Responsiveness Commerce works on interlinked business processes that are time driven – time is money so.. Predictability of performance is very important Short response times in some scenarios are vital Changes in these parameters with workload must be small to negligible – a potential advantage of the GRID Failure modes need to be well explored
5
Supply-side governance Who owns the GRID? What are the ‘global standards’ for it and the services derived from it? If I use it who do I form a relationship with, who takes liability via a contract, and do I have a choice of supplier? What are the International issues in using it (legal, technical, process, language etc)? What body reviews and regulates its national effectiveness in commercial terms – OFGRID?
6
Globalisation of solutions Large commercial problems are almost certainly global – legal and linguistic issues arise Global resilience implies global service provision and possibly ownership and we have yet to do that with telcos! But the Internet… and ICANN and DNS? One of the key technical factors is the product: data source - processor speed – bandwidth- size of random access memory This is difficult to predictably maximise on campus – globally? Success could be the key to attacking real global problems of environment and poverty
7
Trustworthiness of services Trust comes from large number of factors - see this years Reith lectures by Baroness O’Neill Factors such as: Security Credentials Contracts Regulation and Audit Experience Brand value Offsetting natural scepticism to outsourcing the crown jewels to a shared service will be essential for the GRID to succeed.
8
Security Policy Framework User identification and authentication User registration and authorisation Access control Access management Non-repudiation Evidence of receipt Trusted commitment Integrity Privacy and Confidentiality Service availability Information availability Audit and Accounting Service protection Each applied to…………
9
Enterprise Architecture – a framework WhatHowWhereWhoWhenWhy DATAFUNCTIONNETWORKPEOPLETIMEMOTIVATION SCOPE (context) Business critical ‘things Business processesLocation of business ops Important organisations Important events/cycles Business goals and strategies BUSINESS MODEL (conceptual) Semantic model Relationship model Business process model Business logistics systems Workflow model Master schedule and reaction Business plan SYSTEM MODEL (logical) Logical data model Application architecture Distributed system architecture Human Interface architecture Processing structure Business rules TECHNOLOGY MODEL (physical) Physical data model System designTechnology architecture Presentation Architecture Control structure Rule design DETAILED REPRESENTATIONS Out-of-context Data definitionsProgrammesNetwork architecture Security architecture Timing definitions Rule specifications FUNCTIONING ENTERPRISEContentProcessReachTrustGrowthSuccess The Zachman FrameworkIn the context of…
10
In the context of…. Requirements definition Systems analysis Application development Testing and Integration Rollout Operations Disaster Recovery
11
GRID Specific security issues Complex, dynamic heterogeneous user base Lack of control of heritage of applications Separation of services and duties Data and information integrity from shared distributed platforms Complexity of “Insider” threat Service metadata security e.g directories, data replication processes, DR and incident management plans…. How do third parties demonstrate ‘sufficient’ trustworthiness
12
Conclusions GRID could have huge impact on big commercial problems – but big commercial problems are not even identified because of the absence of or lack of understanding of and trust in GRID – so more Outreach is needed. Commercial service and security parameters must be systemic in architecture, conceptual design and implementation of GRID and GRID services or it will fail in the commercial world Global co-ordination (GGF and FP6 to begin with?) is essential. More commercial involvement now will make more probable any commercial exploitation in the future and hence make it affordable for e-science
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.