SlideShare una empresa de Scribd logo
1 de 36
Overview of Policies for Security
and Data Sharing
Ingolf Krüger
Barry Demchak
March 16, 2010
Roadmap
• PALMS (Physical Activity Location Measurement System)
• SOA Review
• PALMS Logical Architecture
• Policy and its composition
• Policy execution – relationship with caBIG
Feel free to ask questions!
PALMS Objectives
• Support data collection and analysis for exposure
biology studies
– Data capture from multiple devices
– Multiple analyses and recombination of data
– Sharing of data between investigators and projects
– Support multiple visualizations (local and remote)
• Extensible and Flexible
– Scalable for large data flows
– Support large number of investigators and studies
– Customizable datasets, calculations, and
visualizations
• HIPAA Compliant and Secure
PALMS Organization and Data Flow (CI)
Authorable & Discoverable
Study
Repository
Study
Repository
Visualizatio
n
Repository
Visualizatio
n
Repository
Calculation
Repository
Calculation
Repository
PALMS Community
PI
Study
Study
Study
PI
Study
Study
PI
Study
PALMSPALMS
StudyStudyStudy
Study
StudyStudy
PI PI
PI
Community
• Policy-driven access
control
– Subject data
– Study data
– Calculations
– Visualizations
• Secure
• HIPAA Compliance
• Customized Studies
• Collaboration
• Data Reuse
Browser
Excel,
Matlab…
Study
Repository
Study
Repository
Visualizatio
n Engine
Visualizatio
n Engine
Calculation
Engine
Calculation
Engine
Data Flow
PALMSPALMS
StudyStudyStudy
Study
StudyStudy
PI
RA
Define
Enter
Subjects
Enter
Observations
Refine
&
Start
Refine & Create
Guest
Study
Repository
Study
Repository
Visualizatio
n Engine
Visualizatio
n Engine
Calculation
Engine
Calculation
Engine
Policy
PALMSPALMS
StudyStudyStudy
Study
StudyStudy
PI
RA
Guest
Policy
Policy
Admin
Defines
Policy (def.):
Permission for
someone to act on
something
Uses
Applies
Policy (alt def.):
Conditional
replacement of one
workflow with
another
Services and SOA
• Loose Coupling
• Late Binding
• Scalability
• Composition
• Interoperability
• Testability
Network
Implementation
Single Server,
Multiple
Processes
Single
Application,
Linked Modules
Logical Deployment
• Malleability
• Manageability
• Dependability
• Incremental development
Logical Architecture (Preview)
Composing Workflow and Policy
• Define and implement Policy Concerns
– A class of policy decision embedded in a workflow
– Characterized by a contract for workflow and dataflow
– Supports reasoning regarding application correctness,
completeness, and contradiction
– Instantiated as policies inserted by stakeholders at either
design time or runtime
If user in [“PIs”, “RAs”, “Guests”]
Continue
Else
Reply “Failure”
Groups and Roles
If user in [“PIs”, “RAs”, “Guests”]
Continue
Else
Reply “Failure”
• Internet2 Grouper
– Hierarchical group
management
– Single point of control
– Permission-based
administration
– Virtual organizations
(VOs)
Identity
If user in [“PIs”, “RAs”, “Guests”]
Continue
Else
Reply “Failure”
• Establishing
– What I have (token)
– What I know (password)
– What I am (biometric)
• Referencing
– Trust relationships
(certification authorities)
– X509 Certificate
– SAML Certificate
– OpenID
Browser Application
3
2
1
Certificate
4
5
User ID &
Password Confirm
ID Provider
caBIG
cancer Biomedical Informatics Grid
– Connects scientists & practitioners: shareable & interoperable infrastructure
– Develop standard rules & common language: easily share information
– Tools: collecting, analyzing, integrating, disseminating cancer information
– Cornerstones
– Federation
– Open development
– Open access
– Open source
– Workspaces
– Clinical Trial Management
– Integrative Cancer Research
– Tissue Banks and Pathology
– Vocabularies & Common Data Elements
– Architecture
– Strategic Planning
– Data Sharing and Intellectual Capital
– Training
caGrid & GAARDS
• Grid Authentication & Authorization with Reliably Distributed Services
– Services & Tools for enforcement of security policy in enterprise grid
– Developed on Globus Toolkit
– Provides
– grid user management
– identity federation
– trust fabric provisioning and management
– group/VO management
– access control policy management and enforcement
– credential delegation
– web SSO
– integration between security domains & grid security domain
caGrid & GAARDS
Relationship to PALMS
• Pros
– Well supported
– caGrid Knowledge Center (Justin Permer/Ohio State
Bioinformatics)
– Professionally managed
– Well developed governance and development models
– Standards-based
– Security: X509 & SAML
– Ontologies: Thesaurus and Metathesaurus
– Sharing infrastructure
– Growing community
• Cons
– Key infrastructure out of our direct control
Questions??
Backup
slides
Composing Workflow and Policy
Scenario: Add Policy to Existing Workflow
(CNN | BBC) > story > if(authorized) > email(story,”x@ucsd.edu”)
• Key issues
– What is policy to compose?
– Where to insert policy? ... capture all paths?
– How to compose multiple policies?
– How to guarantee integrity of workflow?
– Preview: We have to address these
• Current methodologies
– Requirement discovery and hand coding
– Policy-based design & Inversion of Control
– Aspect Oriented Programming
– UML sequence chart composition
• New methodology (preview)
– ORCA
Architecture Definition Methodology
Rich Services VirtualNetwork
Rich Services
RAS4
Services
Service S 1
Roles
U1
U2
U3
U4
U5
Use Case Graph
Concerns
C1 C2 C3
C4
CC1
CC2CC3
Domain Model
R1 R2
R3 R4
R5 R6
R1 R2
msg
R3
CC1
CC2
Role Domain Model
R1 R2
R3 R4
R5 R6
CC1 CC2 CC3
Router/Interceptor
Messenger /Communicator
RAS1 RAS2
CC1 CC4 CC5
Router /Interceptor
Messenger / Communicator
RAS5 RAS6RAS3
S
/
D
S
/
D
RIS:
RIS:
ServiceElicitationRichServiceArchitecture
RAS7
Systemof Systems Topology
H1 H2
H3
H5
H6
H7
H8
H9
H4
RAS1 RAS2 RAS3
RAS5 RAS6 RAS7
Infrastructure Mapping
H1:RAS1 H2:RAS2
H3:CC1
H5:RAS2
H6:RAS5
H7:RAS7H8:RAS7
H9:RAS6
H4:RAS3Optimization
Implementation
RAS1 RAS 2
RAS3 RAS 4
RAS5 RAS 6
RAS7 CC1
CC2 CC3
CC4 CC5
Analysis
Synthesis
Analysis
Identification
Definition
Consolidation
Refinement
Hierarchic
composition
Refinement
Logical Model
SystemArchitecture
Definition
Logical Architecture Loop
DeploymentLoop
User View
Data Flow (Today)
Data Flow (Analysis-centric)
Data Flow (Algebraic)
Artifacts
• User Stories
• Use Cases
• Access Control Patterns
• Domain Modeling
• Dataflow
• Low Fidelity UI
• Service Definitions
• Rich Service
Requirements
Modeling
Service
Modeling
Use Cases
Use Case Attributes
• ID
• Name
• Priority
• Complexity
• Release Number
• Last Revised
• Description
• Actors (Primary and Secondary)
• Stakeholders
• Pre-Conditions
• Constraints
• Post-Conditions
• Triggers
• Cross References
• Flow of Events
– Basic Flow
– Alternative Flows
– Exceptions
• Extensions
• Information Requirements
• Special Requirements
• Frequency of Use
• Assumptions
• Issues and Considerations
– Issues
– Consideration
• Process Flows
• Related Use Cases
RA signs in
RA selects
study
RA uploads
.CSV and .GPX files
PALMS displays summary
RA confirms summary
PALMS commits
dataset
PALMS abandons
dataset
Display error
Display error
All files missing
or invalid
Time range
overlaps
accept decline
Low Fidelity User Interface
Domain Modeling (Overview)
Domain Modeling
Rich Service
Service Interactions (AAI)
Service Interactions (Calculation)
alt
alt
Web
Browser
PALMS Study
Calculation
Engine
StartCalculation(study, protocolID, paramBlockID, resultName)
StartResult
- study
+ study
Start Calculation
Results
Repository
Initiate Result
AddResult(resultName, protocolID, paramBlock)
AddResult
Protocol
Repository
GetProtocolParams(protocolID, paramBlockID)
Get Param Block
ParamBlockResult
The Road ForwardComponent Interactions
Client Server Server
Google Web Toolkit
(GWT)
Mule Enterprise
Service Bus
PALMS Products
• Integration
– Mapping Engines
– Data Mining Engines
– Social Networks
– Disaster Management
• Alerts and Events
• Data Subscriptions
• Data Flow Analysis (provenance flow)
• Scalable and Configurable Calculations
• Collaboration
Questions??

Más contenido relacionado

Destacado

Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescuebdemchak
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentationbdemchak
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how bdemchak
 
Uml introduction
Uml introductionUml introduction
Uml introductionbdemchak
 
Cytoscape ci chapter 1
Cytoscape ci chapter 1Cytoscape ci chapter 1
Cytoscape ci chapter 1bdemchak
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...bdemchak
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration storybdemchak
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...bdemchak
 
Introduction to es bs mule
Introduction to es bs   muleIntroduction to es bs   mule
Introduction to es bs mulebdemchak
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2bdemchak
 
Overview of policies for security and data sharing
Overview of policies for security and data sharingOverview of policies for security and data sharing
Overview of policies for security and data sharingbdemchak
 
Ucsd tum workshop bd
Ucsd tum workshop bdUcsd tum workshop bd
Ucsd tum workshop bdbdemchak
 
Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chatbdemchak
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojurebdemchak
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualizationbdemchak
 
Introduction to soa composition
Introduction to soa compositionIntroduction to soa composition
Introduction to soa compositionbdemchak
 
Provinance in scientific workflows in e science
Provinance in scientific workflows in e scienceProvinance in scientific workflows in e science
Provinance in scientific workflows in e sciencebdemchak
 
Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...bdemchak
 

Destacado (19)

Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescue
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentation
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how
 
Uml introduction
Uml introductionUml introduction
Uml introduction
 
Cytoscape ci chapter 1
Cytoscape ci chapter 1Cytoscape ci chapter 1
Cytoscape ci chapter 1
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration story
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...
 
Introduction to es bs mule
Introduction to es bs   muleIntroduction to es bs   mule
Introduction to es bs mule
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2
 
Overview of policies for security and data sharing
Overview of policies for security and data sharingOverview of policies for security and data sharing
Overview of policies for security and data sharing
 
Ucsd tum workshop bd
Ucsd tum workshop bdUcsd tum workshop bd
Ucsd tum workshop bd
 
Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chat
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojure
 
Palms v
Palms   vPalms   v
Palms v
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualization
 
Introduction to soa composition
Introduction to soa compositionIntroduction to soa composition
Introduction to soa composition
 
Provinance in scientific workflows in e science
Provinance in scientific workflows in e scienceProvinance in scientific workflows in e science
Provinance in scientific workflows in e science
 
Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...
 

Similar a Rich feeds for rescue, palms cyberinfrastructure integration stories

Jisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc RDM
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentationbdemchak
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and StandardsARDC
 
Jisc research data shared service overview IDCC 2016
Jisc research data shared service overview IDCC 2016Jisc research data shared service overview IDCC 2016
Jisc research data shared service overview IDCC 2016Jisc RDM
 
RDM shared services at IDCC
RDM shared services at IDCCRDM shared services at IDCC
RDM shared services at IDCCJisc RDM
 
Data governance datalakes_multitenancy
Data governance datalakes_multitenancyData governance datalakes_multitenancy
Data governance datalakes_multitenancySathish K S
 
MPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
MPLS/SDN 2013 Intercloud Standardization and Testbeds - SillMPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
MPLS/SDN 2013 Intercloud Standardization and Testbeds - SillAlan Sill
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Geoffrey Fox
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...African Open Science Platform
 
State of Florida Neo4j Graph Briefing - Cyber IAM
State of Florida Neo4j Graph Briefing - Cyber IAMState of Florida Neo4j Graph Briefing - Cyber IAM
State of Florida Neo4j Graph Briefing - Cyber IAMNeo4j
 
Cloud e-Genome: NGS Workflows on the Cloud Using e-Science Central
Cloud e-Genome: NGS Workflows on the Cloud Using e-Science CentralCloud e-Genome: NGS Workflows on the Cloud Using e-Science Central
Cloud e-Genome: NGS Workflows on the Cloud Using e-Science CentralPaolo Missier
 
Bitkom Cray presentation - on HPC affecting big data analytics in FS
Bitkom Cray presentation - on HPC affecting big data analytics in FSBitkom Cray presentation - on HPC affecting big data analytics in FS
Bitkom Cray presentation - on HPC affecting big data analytics in FSPhilip Filleul
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLElasticsearch
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptxirfanullahkhan64
 
Architect’s Open-Source Guide for a Data Mesh Architecture
Architect’s Open-Source Guide for a Data Mesh ArchitectureArchitect’s Open-Source Guide for a Data Mesh Architecture
Architect’s Open-Source Guide for a Data Mesh ArchitectureDatabricks
 

Similar a Rich feeds for rescue, palms cyberinfrastructure integration stories (20)

Jisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring Update
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentation
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
 
Ncicbiit
NcicbiitNcicbiit
Ncicbiit
 
Jisc research data shared service overview IDCC 2016
Jisc research data shared service overview IDCC 2016Jisc research data shared service overview IDCC 2016
Jisc research data shared service overview IDCC 2016
 
RDM shared services at IDCC
RDM shared services at IDCCRDM shared services at IDCC
RDM shared services at IDCC
 
SMART Seminar Series: SMART Data Management
SMART Seminar Series: SMART Data ManagementSMART Seminar Series: SMART Data Management
SMART Seminar Series: SMART Data Management
 
Data governance datalakes_multitenancy
Data governance datalakes_multitenancyData governance datalakes_multitenancy
Data governance datalakes_multitenancy
 
Design patterns
Design patternsDesign patterns
Design patterns
 
MPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
MPLS/SDN 2013 Intercloud Standardization and Testbeds - SillMPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
MPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
State of Florida Neo4j Graph Briefing - Cyber IAM
State of Florida Neo4j Graph Briefing - Cyber IAMState of Florida Neo4j Graph Briefing - Cyber IAM
State of Florida Neo4j Graph Briefing - Cyber IAM
 
Cloud e-Genome: NGS Workflows on the Cloud Using e-Science Central
Cloud e-Genome: NGS Workflows on the Cloud Using e-Science CentralCloud e-Genome: NGS Workflows on the Cloud Using e-Science Central
Cloud e-Genome: NGS Workflows on the Cloud Using e-Science Central
 
Bitkom Cray presentation - on HPC affecting big data analytics in FS
Bitkom Cray presentation - on HPC affecting big data analytics in FSBitkom Cray presentation - on HPC affecting big data analytics in FS
Bitkom Cray presentation - on HPC affecting big data analytics in FS
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
Architect’s Open-Source Guide for a Data Mesh Architecture
Architect’s Open-Source Guide for a Data Mesh ArchitectureArchitect’s Open-Source Guide for a Data Mesh Architecture
Architect’s Open-Source Guide for a Data Mesh Architecture
 

Más de bdemchak

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysisbdemchak
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...bdemchak
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructurebdemchak
 
No More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables InteroperabilityNo More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables Interoperabilitybdemchak
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introductionbdemchak
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSbdemchak
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentationbdemchak
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAPbdemchak
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...bdemchak
 
Requirements vs design vs runtime
Requirements vs design vs runtimeRequirements vs design vs runtime
Requirements vs design vs runtimebdemchak
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecturebdemchak
 
Verification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesVerification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesbdemchak
 
Seda an architecture for well-conditioned scalable internet services
Seda   an architecture for well-conditioned scalable internet servicesSeda   an architecture for well-conditioned scalable internet services
Seda an architecture for well-conditioned scalable internet servicesbdemchak
 
Poster iscram 2008
Poster   iscram 2008Poster   iscram 2008
Poster iscram 2008bdemchak
 

Más de bdemchak (15)

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysis
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructure
 
No More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables InteroperabilityNo More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables Interoperability
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introduction
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMS
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentation
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAP
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...
 
Requirements vs design vs runtime
Requirements vs design vs runtimeRequirements vs design vs runtime
Requirements vs design vs runtime
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
Verification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesVerification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policies
 
Seda an architecture for well-conditioned scalable internet services
Seda   an architecture for well-conditioned scalable internet servicesSeda   an architecture for well-conditioned scalable internet services
Seda an architecture for well-conditioned scalable internet services
 
Poster iscram 2008
Poster   iscram 2008Poster   iscram 2008
Poster iscram 2008
 

Último

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 

Último (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 

Rich feeds for rescue, palms cyberinfrastructure integration stories

  • 1. Overview of Policies for Security and Data Sharing Ingolf Krüger Barry Demchak March 16, 2010
  • 2. Roadmap • PALMS (Physical Activity Location Measurement System) • SOA Review • PALMS Logical Architecture • Policy and its composition • Policy execution – relationship with caBIG Feel free to ask questions!
  • 3. PALMS Objectives • Support data collection and analysis for exposure biology studies – Data capture from multiple devices – Multiple analyses and recombination of data – Sharing of data between investigators and projects – Support multiple visualizations (local and remote) • Extensible and Flexible – Scalable for large data flows – Support large number of investigators and studies – Customizable datasets, calculations, and visualizations • HIPAA Compliant and Secure
  • 4. PALMS Organization and Data Flow (CI) Authorable & Discoverable
  • 5. Study Repository Study Repository Visualizatio n Repository Visualizatio n Repository Calculation Repository Calculation Repository PALMS Community PI Study Study Study PI Study Study PI Study PALMSPALMS StudyStudyStudy Study StudyStudy PI PI PI Community • Policy-driven access control – Subject data – Study data – Calculations – Visualizations • Secure • HIPAA Compliance • Customized Studies • Collaboration • Data Reuse Browser Excel, Matlab…
  • 6. Study Repository Study Repository Visualizatio n Engine Visualizatio n Engine Calculation Engine Calculation Engine Data Flow PALMSPALMS StudyStudyStudy Study StudyStudy PI RA Define Enter Subjects Enter Observations Refine & Start Refine & Create Guest
  • 8. Services and SOA • Loose Coupling • Late Binding • Scalability • Composition • Interoperability • Testability Network Implementation Single Server, Multiple Processes Single Application, Linked Modules Logical Deployment • Malleability • Manageability • Dependability • Incremental development
  • 10. Composing Workflow and Policy • Define and implement Policy Concerns – A class of policy decision embedded in a workflow – Characterized by a contract for workflow and dataflow – Supports reasoning regarding application correctness, completeness, and contradiction – Instantiated as policies inserted by stakeholders at either design time or runtime If user in [“PIs”, “RAs”, “Guests”] Continue Else Reply “Failure”
  • 11. Groups and Roles If user in [“PIs”, “RAs”, “Guests”] Continue Else Reply “Failure” • Internet2 Grouper – Hierarchical group management – Single point of control – Permission-based administration – Virtual organizations (VOs)
  • 12. Identity If user in [“PIs”, “RAs”, “Guests”] Continue Else Reply “Failure” • Establishing – What I have (token) – What I know (password) – What I am (biometric) • Referencing – Trust relationships (certification authorities) – X509 Certificate – SAML Certificate – OpenID Browser Application 3 2 1 Certificate 4 5 User ID & Password Confirm ID Provider
  • 13. caBIG cancer Biomedical Informatics Grid – Connects scientists & practitioners: shareable & interoperable infrastructure – Develop standard rules & common language: easily share information – Tools: collecting, analyzing, integrating, disseminating cancer information – Cornerstones – Federation – Open development – Open access – Open source – Workspaces – Clinical Trial Management – Integrative Cancer Research – Tissue Banks and Pathology – Vocabularies & Common Data Elements – Architecture – Strategic Planning – Data Sharing and Intellectual Capital – Training
  • 14. caGrid & GAARDS • Grid Authentication & Authorization with Reliably Distributed Services – Services & Tools for enforcement of security policy in enterprise grid – Developed on Globus Toolkit – Provides – grid user management – identity federation – trust fabric provisioning and management – group/VO management – access control policy management and enforcement – credential delegation – web SSO – integration between security domains & grid security domain
  • 16. Relationship to PALMS • Pros – Well supported – caGrid Knowledge Center (Justin Permer/Ohio State Bioinformatics) – Professionally managed – Well developed governance and development models – Standards-based – Security: X509 & SAML – Ontologies: Thesaurus and Metathesaurus – Sharing infrastructure – Growing community • Cons – Key infrastructure out of our direct control
  • 19. Composing Workflow and Policy Scenario: Add Policy to Existing Workflow (CNN | BBC) > story > if(authorized) > email(story,”x@ucsd.edu”) • Key issues – What is policy to compose? – Where to insert policy? ... capture all paths? – How to compose multiple policies? – How to guarantee integrity of workflow? – Preview: We have to address these • Current methodologies – Requirement discovery and hand coding – Policy-based design & Inversion of Control – Aspect Oriented Programming – UML sequence chart composition • New methodology (preview) – ORCA
  • 20. Architecture Definition Methodology Rich Services VirtualNetwork Rich Services RAS4 Services Service S 1 Roles U1 U2 U3 U4 U5 Use Case Graph Concerns C1 C2 C3 C4 CC1 CC2CC3 Domain Model R1 R2 R3 R4 R5 R6 R1 R2 msg R3 CC1 CC2 Role Domain Model R1 R2 R3 R4 R5 R6 CC1 CC2 CC3 Router/Interceptor Messenger /Communicator RAS1 RAS2 CC1 CC4 CC5 Router /Interceptor Messenger / Communicator RAS5 RAS6RAS3 S / D S / D RIS: RIS: ServiceElicitationRichServiceArchitecture RAS7 Systemof Systems Topology H1 H2 H3 H5 H6 H7 H8 H9 H4 RAS1 RAS2 RAS3 RAS5 RAS6 RAS7 Infrastructure Mapping H1:RAS1 H2:RAS2 H3:CC1 H5:RAS2 H6:RAS5 H7:RAS7H8:RAS7 H9:RAS6 H4:RAS3Optimization Implementation RAS1 RAS 2 RAS3 RAS 4 RAS5 RAS 6 RAS7 CC1 CC2 CC3 CC4 CC5 Analysis Synthesis Analysis Identification Definition Consolidation Refinement Hierarchic composition Refinement Logical Model SystemArchitecture Definition Logical Architecture Loop DeploymentLoop
  • 25. Artifacts • User Stories • Use Cases • Access Control Patterns • Domain Modeling • Dataflow • Low Fidelity UI • Service Definitions • Rich Service Requirements Modeling Service Modeling
  • 27. Use Case Attributes • ID • Name • Priority • Complexity • Release Number • Last Revised • Description • Actors (Primary and Secondary) • Stakeholders • Pre-Conditions • Constraints • Post-Conditions • Triggers • Cross References • Flow of Events – Basic Flow – Alternative Flows – Exceptions • Extensions • Information Requirements • Special Requirements • Frequency of Use • Assumptions • Issues and Considerations – Issues – Consideration • Process Flows • Related Use Cases RA signs in RA selects study RA uploads .CSV and .GPX files PALMS displays summary RA confirms summary PALMS commits dataset PALMS abandons dataset Display error Display error All files missing or invalid Time range overlaps accept decline
  • 28. Low Fidelity User Interface
  • 33. Service Interactions (Calculation) alt alt Web Browser PALMS Study Calculation Engine StartCalculation(study, protocolID, paramBlockID, resultName) StartResult - study + study Start Calculation Results Repository Initiate Result AddResult(resultName, protocolID, paramBlock) AddResult Protocol Repository GetProtocolParams(protocolID, paramBlockID) Get Param Block ParamBlockResult
  • 34. The Road ForwardComponent Interactions Client Server Server Google Web Toolkit (GWT) Mule Enterprise Service Bus
  • 35. PALMS Products • Integration – Mapping Engines – Data Mining Engines – Social Networks – Disaster Management • Alerts and Events • Data Subscriptions • Data Flow Analysis (provenance flow) • Scalable and Configurable Calculations • Collaboration

Notas del editor

  1. <number> Thank the host!
  2. In the beginning: PIs have their studies, and their studies have their data, calculations, and visualizations ----- Insight: Studies can be managed centrally; calculations and visualizations can be reused; collaborations can occur with data, calculations, and visualizations Click 1: Enter PALMS, an Internet-based facility for managing research Click 2: The main features of PALMS: the study repository, calculation repository, and visualization repository Click 3: Community uses PALMS to manage studies, provide calculations, and provide visualizations Click 4: Policy -> HIPAA, Collaboration, etc
  3. PALMS is a role-based system. Data flows are associated with particular roles and particular targets Click 1: A PI can define what data a study retains, what calculations can be made, and what visualizations can be made Click 2: An RA can enter subject and observation information Click 3: Once the information exists in the study, the RA can send it to a calculation engine, and then to a visualizer Click 4: A guest cannot enter data, but can get calculations and visualizations All data flows and requests are subject to policy (next slide)
  4. Policy can be defined at both the PALMS system level and at the study level Click 1: What is a policy? Click 2: Who defines policies?? … it depends on the policy … (RAs can define policies that affect guests) Click 3: An example: A guest wants to run a calculation and get a visualization Click 4: Policy at both the PALMS and study level apply to allow/reject the operation, or to constrain or shape it Important points: - Policy can be used for access control and HIPAA enforcement. - Policy engines monitor all transactions. - Policy engines not only enforce permissions, but they also cause audit logging - Engines similar to the policy engines can also perform encryption, anonymization, decimation, failure management, and so on
  5. Current methodologies Requirement discovery and hand coding Policy-based design & Inversion of Control Aspect Oriented Programming UML sequence chart composition New methodology (preview) ORCA
  6. Add Authentication policy into CNN/BBC workflow … see red decision-making <<<<CLICK>>>> In ORC, see the same decision being inserted <<<<CLICK>>>> <<Go over key issues>> To solve the policy insertion problem, we have to solve these <<<<CLICK>>>> Show existing well-known solutions … not reactive to stakeholder policy insertion <<<<CLICK>>>> ORCA is part of solution … specifies WHAT and WHERE