SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Secure Cloud Computing:
 An Architecture Ontology Approach
                       KEVIN JACKSON
Forces Driving Cloud Computing - The New IT Era




  rev date 3/25/2009        slide 2
Cloud Computing Value




rev date 3/25/2009       slide 3
Cloud Computing Challenge




rev date 3/25/2009       slide 4
Unified Ontology of Cloud Computing
  (http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntology.pdf)




                                                                    Cloud Application
                                                                         (SaaS)
                                                                      Cloud Software Environment
                                                                                 (PaaS)

                                                           Cloud Software Infrastructure
                                            Computational                Storage        Communications
                                           Resources (IaaS)               (DaaS)           (CaaS)

                                                                    Software Kernal

                                                             Firmware / Hardware (HaaS)

Lamia Youseff
University of California, Santa Barbara

Maria Butrico, Dilma Da Silva
IBM T.J. Watson Research Center
Tactical Employment Issues
 Internet connectivity assumed
 SOA platform
   • Security management
   • Application service discovery and management
   • Workflow orchestration
 Access management
Ontology Modifications for Tactical Cloud Computing
                             Access Management
                              Cloud Application
                             Access Management
                                    (SaaS)
                           Cloud Application (SaaS)
                           Cloud Application (SaaS)
                              Cloud Application
                   Workflow Orchestration – Policy Engine
                                      (SaaS)
                              Workflow Orchestration
                                    Security API
                                   Cloud Software Environment
                                    Security API
                           Services / Services(PaaS)
                                                Discovery
                                   Cloud Software Environment
                           Services / Services Discovery
                                               (PaaS)
                                Service Management
                                Service Management
                                      Cloud Software Environment
                         Cloud Software Infrastructure
                                                   (PaaS)
                                      Cloud Software Environment
                         Cloud Software Infrastructure
                                                  (PaaS)
                              Cloud Software Infrastructure
                                 Network Security Communications
              Computational           Storage
                              Cloud Software Infrastructure
              Computational           Storage         Communications
             Resources (IaaS)          (DaaS)             (CaaS)
                              Network(DaaS)
                                        Connectivity
             Resources (IaaS)                             (CaaS)
                    ComputationalNetwork Storage        Communications
                                           Security
      Computational Resources (IaaS)
                     Resources             (DaaS)          (CaaS)
                                       Storage
                                                        Communications (CaaS)
                                  Software Kernal
              (IaaS)                    (DaaS)
                                  Software Kernal
                               Software Kernal
                               Software Kernal
                        Firmware / Hardware (HaaS)
                        Firmware / Hardware (HaaS)
Tactical Cloud Computing Ontology
                              Access Management
                          Cloud Application (SaaS)
                  Workflow Orchestration – Policy Engine
                               Security API
                       Services / Services Discovery
                                Service Management
                                     Cloud Software Environment
                                                (PaaS)
                              Cloud Software Infrastructure
                                 Network Security
                              Network Connectivity
                                 Network Security
    Computational Resources            Storage
                                                      Communications (CaaS)
            (IaaS)                      (DaaS)

                                 Software Kernal

                        Firmware / Hardware (HaaS)
Ontology Modification – Federated SOA


                                                                                Global Governance
                                                                                    Dynamic Tasking
                                         Access Management                                                                                    Access Management

                                       Cloud Application (SaaS)                                                                             Cloud Application (SaaS)

                                 Workflow Orchestration – Policy Engine                                                               Workflow Orchestration – Policy Engine
                                              Security API                                                                                         Security API
                                       Services / Services Discovery                                                                        Services / Services Discovery

                                           Service Management                                                                                   Service Management

                                                       Cloud Software Environment                                                                           Cloud Software Environment
                                                                  (PaaS)                                                                                               (PaaS)

                                          Cloud Software Infrastructure                                                                        Cloud Software Infrastructure
                                           Network Security                                                                                     Network Security
                                         Network Connectivity                                                                                 Network Connectivity
                                           Network Security                                                                                     Network Security
                                                  Storage                                                                                              Storage
Computational Resources (IaaS)                                               Communications (CaaS)   Computational Resources (IaaS)                                               Communications (CaaS)
                                                   (DaaS)                                                                                               (DaaS)


                                           Software Kernal                                                                                      Software Kernal


                                     Firmware / Hardware (HaaS)                                                                           Firmware / Hardware (HaaS)
Secure Cloud Computing – An Approach
•Access Management
     • “Out of Band”                                          Access Management
                                                            Cloud Application (SaaS)
     authentication
•Security API                                        Workflow Orchestration – Policy Engine

     • Use of services                                             Security API
                                                            Services / Services Discovery
     • Binding of service
                                                                Service Management
     • COI driven
                                                                         Cloud Software Environment
     management                                                                     (PaaS)
•Network Security
                                                              Cloud Software Infrastructure
     • No VPN
                                                                Network Security
     • “Data in Motion”
                                                              Network Connectivity
     security
                                                                Network Security
•Computational Resources         Computational Resources               Storage
                                                                                              Communications (CaaS)
     • VM management                     (IaaS)                         (DaaS)

     • Data-centric security                                    Software Kernal
     model
                                                           Firmware / Hardware (HaaS)
• Storage
     • “Data at Rest” security
     • COI driven access
Network Centric Operations Industry Consortium
 Mission
    Our mission is to facilitate global realization of the benefit inherent in
     Network Centric Operations. To that end, we seek to enable continuously
     increasing levels of interoperability across the spectrum of joint,
     interagency, intergovernmental, and multinational industrial and
     commercial operations. We will execute this mission in good faith as a
     global organization with membership open to all enterprises in quest of
     applying the vast potential of network centric technology to the operational
     challenges faced by our nations and their citizens.
 Past successes
 ◦ Network Centric Analysis Tool (NCAT)
 ◦ NCOIC Interoperability Framework (NIF)
 Future
 ◦ Develop “operational art” in support of netcentric operations
 ◦ Support operational art advances through collaboration (Government,
   Industry, Non-profits, Interest Groups)
 ◦ Provide value to members
    Use of NCOIC developed process provided differentiator in recent
     European procurement for a member company
    NCOIC Patterns addressing interoperability concerns of member
     government agencies
Cloud Computing Operational Art

  Embrace collaboration
     • OSD – tactical Cloud Computing
     • TIGR – Government Cloud Computing
     • Cloud Interoperability Forum
  Use Operational and Capability pattern process to develop Cloud
   Computing Technical Patterns
  Identify key netcentric operations interoperability requirements and
   preferences within identified technical patterns
  Iterate with NCOIC stakeholder companies and government
   organizations
  Use Capability and Operational patterns to validate operational
   impact of reduced cloud interoperability
  Leverage analysis to drive cloud interoperability recommendations
   and best practices
Thank You !
Kevin.jackson@dataline.com
http://cloudcomputing.dataline.com
http://govcloud.ulitzer.com

Más contenido relacionado

La actualidad más candente

AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1Amazon Web Services
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
 
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018Amazon Web Services
 
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1GovCloud Network
 
2011 State of the Cloud: A Year's Worth of Innovation in 30 Minutes - Jinesh...
2011 State of the Cloud:  A Year's Worth of Innovation in 30 Minutes - Jinesh...2011 State of the Cloud:  A Year's Worth of Innovation in 30 Minutes - Jinesh...
2011 State of the Cloud: A Year's Worth of Innovation in 30 Minutes - Jinesh...Amazon Web Services
 
Practical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSPractical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSSamsung Electronics
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance Array Networks
 
A Market Segment Analysis | Leading Cloud Innovators
A Market Segment Analysis | Leading Cloud InnovatorsA Market Segment Analysis | Leading Cloud Innovators
A Market Segment Analysis | Leading Cloud InnovatorsR2Labs
 
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxTrack 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxAmazon Web Services
 
Cloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteCloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteRamnivasLaddad
 
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftNIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftAmazon Web Services
 
Leveraging The Clouds For Reliable Web Applications Presentation
Leveraging The Clouds For Reliable Web Applications PresentationLeveraging The Clouds For Reliable Web Applications Presentation
Leveraging The Clouds For Reliable Web Applications PresentationWeb 2.0 Expo
 
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaYour Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaAmazon Web Services
 
Jazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
Jazoon 2012 - Systems Integration in the Cloud Era with Apache CamelJazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
Jazoon 2012 - Systems Integration in the Cloud Era with Apache CamelKai Wähner
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionAmazon Web Services
 
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...Club Cloud des Partenaires
 
Azure vmware solutions para partners
Azure vmware solutions para partnersAzure vmware solutions para partners
Azure vmware solutions para partnersskadobayashi
 
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...
Cloud Computing – Time for delivery.  The question is not “if”, but “how, whe...Cloud Computing – Time for delivery.  The question is not “if”, but “how, whe...
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...Capgemini
 

La actualidad más candente (20)

AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
Realize Value of Your Microsoft Investments - Transformation Day Montreal 2018
 
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
 
2011 State of the Cloud: A Year's Worth of Innovation in 30 Minutes - Jinesh...
2011 State of the Cloud:  A Year's Worth of Innovation in 30 Minutes - Jinesh...2011 State of the Cloud:  A Year's Worth of Innovation in 30 Minutes - Jinesh...
2011 State of the Cloud: A Year's Worth of Innovation in 30 Minutes - Jinesh...
 
Practical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSPractical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBS
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance
 
A Market Segment Analysis | Leading Cloud Innovators
A Market Segment Analysis | Leading Cloud InnovatorsA Market Segment Analysis | Leading Cloud Innovators
A Market Segment Analysis | Leading Cloud Innovators
 
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxTrack 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
 
Cloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteCloud Foundry Open Tour Keynote
Cloud Foundry Open Tour Keynote
 
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftNIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up Loft
 
Leveraging The Clouds For Reliable Web Applications Presentation
Leveraging The Clouds For Reliable Web Applications PresentationLeveraging The Clouds For Reliable Web Applications Presentation
Leveraging The Clouds For Reliable Web Applications Presentation
 
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaYour Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
 
Jazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
Jazoon 2012 - Systems Integration in the Cloud Era with Apache CamelJazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
Jazoon 2012 - Systems Integration in the Cloud Era with Apache Camel
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud Adoption
 
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
2011.11.22 - Comment développer un Business de Cloud Builder - 8ème Forum du ...
 
Azure vmware solutions para partners
Azure vmware solutions para partnersAzure vmware solutions para partners
Azure vmware solutions para partners
 
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...
Cloud Computing – Time for delivery.  The question is not “if”, but “how, whe...Cloud Computing – Time for delivery.  The question is not “if”, but “how, whe...
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...
 
Roadmap to hyper hybrid cloud
Roadmap to hyper hybrid cloudRoadmap to hyper hybrid cloud
Roadmap to hyper hybrid cloud
 

Similar a Secure Cloud Computing Architecture Ontology Approach

Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101kriggins
 
MPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsMPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsCisco Service Provider
 
CCitDG Presenation
CCitDG PresenationCCitDG Presenation
CCitDG PresenationDatabarracks
 
NIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudNIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudKristian Nese
 
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or LessCloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or LessSalesforce_APAC
 
Aras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the CloudAras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the CloudAras
 
Aras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLMAras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLMAras
 
Mach Technology
Mach Technology Mach Technology
Mach Technology Open Stack
 
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...Kai Wähner
 
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...Kai Wähner
 
Raindance - Tooling for the Clouds
Raindance - Tooling for the CloudsRaindance - Tooling for the Clouds
Raindance - Tooling for the CloudsMarkus Knauer
 
BlazeClan Technologies
BlazeClan TechnologiesBlazeClan Technologies
BlazeClan TechnologiesVaroon Rajani
 
High Value Cloud Services
High Value Cloud ServicesHigh Value Cloud Services
High Value Cloud ServicesLaura Ventura
 
Paving the Way to IT-as-a-Service
Paving the Way to IT-as-a-ServicePaving the Way to IT-as-a-Service
Paving the Way to IT-as-a-Servicebuildacloud
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
 
Blaze clan company presentation
Blaze clan   company presentationBlaze clan   company presentation
Blaze clan company presentationSupratik Ghatak
 
BlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company PresentationBlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company PresentationSupratik Ghatak
 

Similar a Secure Cloud Computing Architecture Ontology Approach (20)

Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101
 
MPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsMPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service Models
 
Dataline SOA-R
Dataline SOA-RDataline SOA-R
Dataline SOA-R
 
CCitDG Presenation
CCitDG PresenationCCitDG Presenation
CCitDG Presenation
 
NIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudNIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private Cloud
 
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or LessCloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
 
Aras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the CloudAras PLM Software Leveraging the Cloud
Aras PLM Software Leveraging the Cloud
 
Aras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLMAras Leveraging the Cloud for PLM
Aras Leveraging the Cloud for PLM
 
Mach Technology
Mach Technology Mach Technology
Mach Technology
 
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
Systems Integration in the Cloud Era - API vs. Integration Framework vs. Ente...
 
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
Next Generation – Systems Integration in the Cloud Era with Apache Camel - Ja...
 
Raindance - Tooling for the Clouds
Raindance - Tooling for the CloudsRaindance - Tooling for the Clouds
Raindance - Tooling for the Clouds
 
BlazeClan Technologies
BlazeClan TechnologiesBlazeClan Technologies
BlazeClan Technologies
 
High Value Cloud Services
High Value Cloud ServicesHigh Value Cloud Services
High Value Cloud Services
 
Paving the Way to IT-as-a-Service
Paving the Way to IT-as-a-ServicePaving the Way to IT-as-a-Service
Paving the Way to IT-as-a-Service
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
 
Blaze clan company presentation
Blaze clan   company presentationBlaze clan   company presentation
Blaze clan company presentation
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
BlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company PresentationBlazeClan Technologies - Company Presentation
BlazeClan Technologies - Company Presentation
 

Más de GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin JacksonGovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 

Más de GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Último

React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Último (20)

React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Secure Cloud Computing Architecture Ontology Approach

  • 1. Secure Cloud Computing: An Architecture Ontology Approach KEVIN JACKSON
  • 2. Forces Driving Cloud Computing - The New IT Era rev date 3/25/2009 slide 2
  • 3. Cloud Computing Value rev date 3/25/2009 slide 3
  • 4. Cloud Computing Challenge rev date 3/25/2009 slide 4
  • 5. Unified Ontology of Cloud Computing (http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntology.pdf) Cloud Application (SaaS) Cloud Software Environment (PaaS) Cloud Software Infrastructure Computational Storage Communications Resources (IaaS) (DaaS) (CaaS) Software Kernal Firmware / Hardware (HaaS) Lamia Youseff University of California, Santa Barbara Maria Butrico, Dilma Da Silva IBM T.J. Watson Research Center
  • 6. Tactical Employment Issues  Internet connectivity assumed  SOA platform • Security management • Application service discovery and management • Workflow orchestration  Access management
  • 7. Ontology Modifications for Tactical Cloud Computing Access Management Cloud Application Access Management (SaaS) Cloud Application (SaaS) Cloud Application (SaaS) Cloud Application Workflow Orchestration – Policy Engine (SaaS) Workflow Orchestration Security API Cloud Software Environment Security API Services / Services(PaaS) Discovery Cloud Software Environment Services / Services Discovery (PaaS) Service Management Service Management Cloud Software Environment Cloud Software Infrastructure (PaaS) Cloud Software Environment Cloud Software Infrastructure (PaaS) Cloud Software Infrastructure Network Security Communications Computational Storage Cloud Software Infrastructure Computational Storage Communications Resources (IaaS) (DaaS) (CaaS) Network(DaaS) Connectivity Resources (IaaS) (CaaS) ComputationalNetwork Storage Communications Security Computational Resources (IaaS) Resources (DaaS) (CaaS) Storage Communications (CaaS) Software Kernal (IaaS) (DaaS) Software Kernal Software Kernal Software Kernal Firmware / Hardware (HaaS) Firmware / Hardware (HaaS)
  • 8. Tactical Cloud Computing Ontology Access Management Cloud Application (SaaS) Workflow Orchestration – Policy Engine Security API Services / Services Discovery Service Management Cloud Software Environment (PaaS) Cloud Software Infrastructure Network Security Network Connectivity Network Security Computational Resources Storage Communications (CaaS) (IaaS) (DaaS) Software Kernal Firmware / Hardware (HaaS)
  • 9. Ontology Modification – Federated SOA Global Governance Dynamic Tasking Access Management Access Management Cloud Application (SaaS) Cloud Application (SaaS) Workflow Orchestration – Policy Engine Workflow Orchestration – Policy Engine Security API Security API Services / Services Discovery Services / Services Discovery Service Management Service Management Cloud Software Environment Cloud Software Environment (PaaS) (PaaS) Cloud Software Infrastructure Cloud Software Infrastructure Network Security Network Security Network Connectivity Network Connectivity Network Security Network Security Storage Storage Computational Resources (IaaS) Communications (CaaS) Computational Resources (IaaS) Communications (CaaS) (DaaS) (DaaS) Software Kernal Software Kernal Firmware / Hardware (HaaS) Firmware / Hardware (HaaS)
  • 10. Secure Cloud Computing – An Approach •Access Management • “Out of Band” Access Management Cloud Application (SaaS) authentication •Security API Workflow Orchestration – Policy Engine • Use of services Security API Services / Services Discovery • Binding of service Service Management • COI driven Cloud Software Environment management (PaaS) •Network Security Cloud Software Infrastructure • No VPN Network Security • “Data in Motion” Network Connectivity security Network Security •Computational Resources Computational Resources Storage Communications (CaaS) • VM management (IaaS) (DaaS) • Data-centric security Software Kernal model Firmware / Hardware (HaaS) • Storage • “Data at Rest” security • COI driven access
  • 11. Network Centric Operations Industry Consortium  Mission  Our mission is to facilitate global realization of the benefit inherent in Network Centric Operations. To that end, we seek to enable continuously increasing levels of interoperability across the spectrum of joint, interagency, intergovernmental, and multinational industrial and commercial operations. We will execute this mission in good faith as a global organization with membership open to all enterprises in quest of applying the vast potential of network centric technology to the operational challenges faced by our nations and their citizens.  Past successes ◦ Network Centric Analysis Tool (NCAT) ◦ NCOIC Interoperability Framework (NIF)  Future ◦ Develop “operational art” in support of netcentric operations ◦ Support operational art advances through collaboration (Government, Industry, Non-profits, Interest Groups) ◦ Provide value to members  Use of NCOIC developed process provided differentiator in recent European procurement for a member company  NCOIC Patterns addressing interoperability concerns of member government agencies
  • 12. Cloud Computing Operational Art  Embrace collaboration • OSD – tactical Cloud Computing • TIGR – Government Cloud Computing • Cloud Interoperability Forum  Use Operational and Capability pattern process to develop Cloud Computing Technical Patterns  Identify key netcentric operations interoperability requirements and preferences within identified technical patterns  Iterate with NCOIC stakeholder companies and government organizations  Use Capability and Operational patterns to validate operational impact of reduced cloud interoperability  Leverage analysis to drive cloud interoperability recommendations and best practices