SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
PoSecCo: modelling services
  for the Future Internet
          Antonio Lioy
      Politecnico di Torino
        <lioy@polito.it>

   Amsterdam - July 4-5, 2011
Posecco scenario: Future Internet seen
from a Service Provider (SP)
           security reqs                                                           security reqs from
         from customers                      SP-customers                          laws and regulations




                                                                                             security reqs
             Provider
             Service



  sec reqs                  Service       Service        Service         service             from suppliers
from mgmt

                    application                     application
                                                                                   application
                                       application         application


                                  DB                                                  DB
                                                            Supplier




                                                                                                 Supplier
  SP-staff              system                  system                   system
                           network
                                                                                                            2
PoSecCo view: services in FI




                               3
What to model?

 companies run business processes/services
   the interesting ones are the ones implemented using IT resources
 SP main goal? reducing costs
   infrastructure
      re-use existing services
      avoid re-implementing a service for each customer
          … if the policy allows it
   implementation and maintenance
      integrated policy refinement using the “policy chain”
   … with a higher level of security
 PoSecCo aims at supporting SPs with models and tools
                                                                      4
Main requirements …
 business services (BS) can be implemented by a number of
 different IT services (i.e., abstract service profiles)
 several customers can buy the same BS and every customer may
 use one or more instances of an IT service
 IT service = components + choreography
 IT services interact with other IT services or use other IT services
 as sub-components
 every IT service may have different instantiations
    using different physical or virtual resources (running services) and sub-
    services
    running services can execute several components of the same IT service
    running services can execute several components from different IT
    services
 SP can outsource (sub-)services, applications, or HW (hosting
 providers)
                                                                                5
A quick look at Posecco meta-models

        Services                        Policies
                                      Business policy
    Business meta-model                meta-model

                                IT policy (access control,
    IT service meta-model      confidentiality, filtering, …)

                                configurations for policy
  Infrastructure meta-model    enabled security elements


                                                            6
A quick look at Posecco meta-models

                                  current service
                                   meta-model
        Services

    Business meta-model


    IT service meta-model


  Infrastructure meta-model

                                                    7
Service modelling layers
IT layer
Infrastructure




                                 8
Some more details: the concepts

                                              business        business          business
             institutions
                                               service        process         information

                service        hosting
 customers
               providers      providers


                     IT Resource     IT service      IT service
   Links                                                                          Data
                        model        interface         model


                                    IT resource
                    IT resource                      IT service
                                     interface


  channel                                                              node
                    IT resource      interface

                                                            physical          virtual
                                                             node              node
                                                                                         9
Business layer: business services




 business services (BS) are structured in processes
     terminology from TUe and not in contrast with BPMN
     BS are not necessarily the ones implemented using IT technologies
     implemented by a number of different IT services (i.e., abstract service
     profiles)
                                                                                10
 business processes (BP) may be structured in hierarchies and may depend on other
 BPs
Business layer: institutions




 BP customers
     several customers can buy the same BS and every customer may use one or
     more instances of an IT service
 service providers (SP) and their relationships: SPs buying services from other SPs
 hosting providers                                                                    11
Business layer: business info




 very abstract concepts to be further instantiated and adapted
 roles
     not the same as the standard “access control role”, described in the IT policy
     meta-model
     more abstract, associated to company-dependent functions                         12
IT layer: the service models




 IT service model: abstract definition corresponding to the interface it exposes
 IT services interact with other IT services or use them as sub-components
 IT service models are described by
     components: IT resources (the Applications)
     choreography: a link connects a resource to an interface
 IT resource is an abstract definition of the component/application
     web server, FTP server, Invoice application, EDI, …
 every IT service may have different implementations
     using different physical or virtual resources (running services) and sub-services13
IT layer: data




 first class entities in the access control meta-model
 need to be customized in the model
      according to customer and SP needs




                                                         14
Catalog: what an SP sells




 used to enumerate all the service models sold by a SP
   Crossgate requirement: modern way of managing It services
      instead of defining a general service model with configurable parameters
      (e.g., communication protocols, web server types) good for academia
   e.g., if the SP sells two versions of the “invoicing BS”, one allowing
   access to the front end using SFTP and one HTTPS, the catalog will
   include two instances of ITServiceProfile


                                                                                 15
Infrastructure layer: running services




  every IT service model may be implemented
      using different physical or virtual resources (running services) and sub-services
  to re-use components and save time and money:…
      running services can execute several components of the same IT service
      running services can execute several components from different IT services
      e.g., web servers running front ends, DBs                                        16
Infrastructure layer: the landscape




 virtual and physical nodes connected through interfaces
      located somewhere (for dependability and risk analysis purposes)
 full topology information may be described
      according to the required level of details
          PoSecCo uses full topology view for the configuration generation
          e.g., to configure all the firewalls and VPN terminators in the landscape   17
The PoSecCo ontology(ies)

                                      business meta-model
                                      business ontology (?)


                                      IT layer meta-model
                                      IT layer ontology


                                      infrastructure meta-model
                                      infrastructure ontology



                extend concepts in meta-models with a
                semantically richer tool
                use the “inclusion” and “equivalence”
                features to link the separated ontologies
                                                                  18
Tools and formats

 meta-models as standard UML class diagrams
 from meta-models to models
   constrain the model derivation process to avoid integration issues
   XML representation in the PoSecCo repository
   meta-models
   models
   instances
   …ongoing effort
   ontologies represented in OWL




                                                                    19
PoSecCo and EffectPlus

 PoSecCo will provide:
   meta-models for services in a SP-oriented scenario
   layered architecture: business, IT and infrastructure
   full details in a document that will come soon
 inputs:
   test your service description with our model and provide us the missing
   requirements
      e.g., more info on service virtualization
 collaboration:
   a service modelling working group?
 common output:
   unified meta-model for Future Internet
   … agreed and adopted by all the EffectPlus partners (at least)
                                                                         20
THANK YOU!
Disclaimer

EU Disclaimer
PoSecCo project (project no. 257129) is partially supported/co-funded by the European
Community/ European Union/EU under the Information and Communication Technologies (ICT)
theme of the 7th Framework Programme for R&D (FP7).

This document does not represent the opinion of the European Community, and the European
Community is not responsible for any use that might be made of its content.

PoSecCo Disclaimer
The information in this document is provided "as is", and no guarantee or warranty is given that
the information is fit for any particular purpose. The above referenced consortium members shall
have no liability for damages of any kind including without limitation direct, special, indirect, or
consequential damages that may result from the use of these materials subject to any liability
which is mandatory due to applicable law.




                                                                                                   22
23
24

Más contenido relacionado

La actualidad más candente

Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Mohammed Omar
 
20091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 520091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 5Arian Zwegers
 
API Management for Enterprise Mobile Access a How-to Guide
API Management for Enterprise Mobile Access  a How-to GuideAPI Management for Enterprise Mobile Access  a How-to Guide
API Management for Enterprise Mobile Access a How-to GuideCA API Management
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyijcseit
 
Bloombase Spitfire SOA Security Server Brochure
Bloombase Spitfire SOA Security Server BrochureBloombase Spitfire SOA Security Server Brochure
Bloombase Spitfire SOA Security Server BrochureBloombase
 
Management Architecture for Dynamic Federated Identity Management
Management Architecture for Dynamic Federated Identity Management Management Architecture for Dynamic Federated Identity Management
Management Architecture for Dynamic Federated Identity Management csandit
 
Distributed systems and middleware
Distributed systems and middlewareDistributed systems and middleware
Distributed systems and middlewareClaudio Fiandrino
 
Company profile
Company profileCompany profile
Company profileLundegaard
 
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Jennifer Stevenson
 
Spagic3 Presentation En
Spagic3 Presentation EnSpagic3 Presentation En
Spagic3 Presentation EnSpagoWorld
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardConference Papers
 
Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001jucaab
 
Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyCisco Canada
 
Driving Competitive Advantage through Customer-Focused Solution Selling
Driving Competitive Advantage through Customer-Focused Solution SellingDriving Competitive Advantage through Customer-Focused Solution Selling
Driving Competitive Advantage through Customer-Focused Solution SellingFlexera
 
Supply chain presentation 11 2006
Supply chain presentation 11 2006Supply chain presentation 11 2006
Supply chain presentation 11 2006Girard Brewer
 
Security, Governance & Integration in a Cloud Connected World
Security, Governance & Integration in a Cloud Connected WorldSecurity, Governance & Integration in a Cloud Connected World
Security, Governance & Integration in a Cloud Connected WorldCA API Management
 
Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001jucaab
 

La actualidad más candente (18)

Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...
 
20091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 520091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 5
 
API Management for Enterprise Mobile Access a How-to Guide
API Management for Enterprise Mobile Access  a How-to GuideAPI Management for Enterprise Mobile Access  a How-to Guide
API Management for Enterprise Mobile Access a How-to Guide
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancy
 
Bloombase Spitfire SOA Security Server Brochure
Bloombase Spitfire SOA Security Server BrochureBloombase Spitfire SOA Security Server Brochure
Bloombase Spitfire SOA Security Server Brochure
 
Management Architecture for Dynamic Federated Identity Management
Management Architecture for Dynamic Federated Identity Management Management Architecture for Dynamic Federated Identity Management
Management Architecture for Dynamic Federated Identity Management
 
Distributed systems and middleware
Distributed systems and middlewareDistributed systems and middleware
Distributed systems and middleware
 
Company profile
Company profileCompany profile
Company profile
 
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
 
Spagic3 Presentation En
Spagic3 Presentation EnSpagic3 Presentation En
Spagic3 Presentation En
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001
 
Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case Study
 
Driving Competitive Advantage through Customer-Focused Solution Selling
Driving Competitive Advantage through Customer-Focused Solution SellingDriving Competitive Advantage through Customer-Focused Solution Selling
Driving Competitive Advantage through Customer-Focused Solution Selling
 
Supply chain presentation 11 2006
Supply chain presentation 11 2006Supply chain presentation 11 2006
Supply chain presentation 11 2006
 
Security, Governance & Integration in a Cloud Connected World
Security, Governance & Integration in a Cloud Connected WorldSecurity, Governance & Integration in a Cloud Connected World
Security, Governance & Integration in a Cloud Connected World
 
Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001
 
542 546
542 546542 546
542 546
 

Destacado

Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meetingfcleary
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704fcleary
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meetingfcleary
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectivesfcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meetingfcleary
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meetingfcleary
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meetingfcleary
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1fcleary
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides amsfcleary
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meetingfcleary
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisifcleary
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meetingfcleary
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1fcleary
 

Destacado (19)

Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
 
Syssec
SyssecSyssec
Syssec
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Tdl
TdlTdl
Tdl
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
Nessos
NessosNessos
Nessos
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 

Similar a Posecco cluster meeting

Cloud Computing Why, What, How
Cloud Computing   Why, What, HowCloud Computing   Why, What, How
Cloud Computing Why, What, HowKennisportal
 
20090213 Friday Food Croslocis
20090213 Friday Food Croslocis20090213 Friday Food Croslocis
20090213 Friday Food Croslocisimec.archive
 
20090213 Friday Food croslocis
20090213 Friday Food croslocis20090213 Friday Food croslocis
20090213 Friday Food croslocisimec.archive
 
Compositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML ServicesCompositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML ServicesDebmalya Biswas
 
Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Sandro Pereira
 
7irene Application Reference Model - Presented at OT2004
7irene Application Reference Model - Presented at OT20047irene Application Reference Model - Presented at OT2004
7irene Application Reference Model - Presented at OT2004ghodgkinson
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfMansiMehta96928
 
Impact 2011 2667 - Developing effective services for use in critical business...
Impact 2011 2667 - Developing effective services for use in critical business...Impact 2011 2667 - Developing effective services for use in critical business...
Impact 2011 2667 - Developing effective services for use in critical business...Brian Petrini
 
Soa Overview
Soa OverviewSoa Overview
Soa OverviewTerry Cho
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology poonam kumawat
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Developmentijbuiiir1
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Developmentijwtiir
 
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Ike Alisson
 
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?Brian Elvesæter
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 

Similar a Posecco cluster meeting (20)

Cloud Computing Why, What, How
Cloud Computing   Why, What, HowCloud Computing   Why, What, How
Cloud Computing Why, What, How
 
20090213 Friday Food Croslocis
20090213 Friday Food Croslocis20090213 Friday Food Croslocis
20090213 Friday Food Croslocis
 
20090213 Friday Food croslocis
20090213 Friday Food croslocis20090213 Friday Food croslocis
20090213 Friday Food croslocis
 
Compositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML ServicesCompositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML Services
 
Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm
 
7irene Application Reference Model - Presented at OT2004
7irene Application Reference Model - Presented at OT20047irene Application Reference Model - Presented at OT2004
7irene Application Reference Model - Presented at OT2004
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
Impact 2011 2667 - Developing effective services for use in critical business...
Impact 2011 2667 - Developing effective services for use in critical business...Impact 2011 2667 - Developing effective services for use in critical business...
Impact 2011 2667 - Developing effective services for use in critical business...
 
Soa Overview
Soa OverviewSoa Overview
Soa Overview
 
Unit 4 -IOT1.pptx
Unit 4 -IOT1.pptxUnit 4 -IOT1.pptx
Unit 4 -IOT1.pptx
 
soa ppt v7.ppt
soa ppt v7.pptsoa ppt v7.ppt
soa ppt v7.ppt
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Development
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Development
 
Middleware1
Middleware1Middleware1
Middleware1
 
Middleware
MiddlewareMiddleware
Middleware
 
Api enablement-mainframe
Api enablement-mainframeApi enablement-mainframe
Api enablement-mainframe
 
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
 
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 

Más de fcleary

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report fcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meetingfcleary
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus wsfcleary
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingfcleary
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meetingfcleary
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fclearyfcleary
 

Más de fcleary (7)

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meeting
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meeting
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fcleary
 

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Posecco cluster meeting

  • 1. PoSecCo: modelling services for the Future Internet Antonio Lioy Politecnico di Torino <lioy@polito.it> Amsterdam - July 4-5, 2011
  • 2. Posecco scenario: Future Internet seen from a Service Provider (SP) security reqs security reqs from from customers SP-customers laws and regulations security reqs Provider Service sec reqs Service Service Service service from suppliers from mgmt application application application application application DB DB Supplier Supplier SP-staff system system system network 2
  • 4. What to model? companies run business processes/services the interesting ones are the ones implemented using IT resources SP main goal? reducing costs infrastructure re-use existing services avoid re-implementing a service for each customer … if the policy allows it implementation and maintenance integrated policy refinement using the “policy chain” … with a higher level of security PoSecCo aims at supporting SPs with models and tools 4
  • 5. Main requirements … business services (BS) can be implemented by a number of different IT services (i.e., abstract service profiles) several customers can buy the same BS and every customer may use one or more instances of an IT service IT service = components + choreography IT services interact with other IT services or use other IT services as sub-components every IT service may have different instantiations using different physical or virtual resources (running services) and sub- services running services can execute several components of the same IT service running services can execute several components from different IT services SP can outsource (sub-)services, applications, or HW (hosting providers) 5
  • 6. A quick look at Posecco meta-models Services Policies Business policy Business meta-model meta-model IT policy (access control, IT service meta-model confidentiality, filtering, …) configurations for policy Infrastructure meta-model enabled security elements 6
  • 7. A quick look at Posecco meta-models current service meta-model Services Business meta-model IT service meta-model Infrastructure meta-model 7
  • 8. Service modelling layers IT layer Infrastructure 8
  • 9. Some more details: the concepts business business business institutions service process information service hosting customers providers providers IT Resource IT service IT service Links Data model interface model IT resource IT resource IT service interface channel node IT resource interface physical virtual node node 9
  • 10. Business layer: business services business services (BS) are structured in processes terminology from TUe and not in contrast with BPMN BS are not necessarily the ones implemented using IT technologies implemented by a number of different IT services (i.e., abstract service profiles) 10 business processes (BP) may be structured in hierarchies and may depend on other BPs
  • 11. Business layer: institutions BP customers several customers can buy the same BS and every customer may use one or more instances of an IT service service providers (SP) and their relationships: SPs buying services from other SPs hosting providers 11
  • 12. Business layer: business info very abstract concepts to be further instantiated and adapted roles not the same as the standard “access control role”, described in the IT policy meta-model more abstract, associated to company-dependent functions 12
  • 13. IT layer: the service models IT service model: abstract definition corresponding to the interface it exposes IT services interact with other IT services or use them as sub-components IT service models are described by components: IT resources (the Applications) choreography: a link connects a resource to an interface IT resource is an abstract definition of the component/application web server, FTP server, Invoice application, EDI, … every IT service may have different implementations using different physical or virtual resources (running services) and sub-services13
  • 14. IT layer: data first class entities in the access control meta-model need to be customized in the model according to customer and SP needs 14
  • 15. Catalog: what an SP sells used to enumerate all the service models sold by a SP Crossgate requirement: modern way of managing It services instead of defining a general service model with configurable parameters (e.g., communication protocols, web server types) good for academia e.g., if the SP sells two versions of the “invoicing BS”, one allowing access to the front end using SFTP and one HTTPS, the catalog will include two instances of ITServiceProfile 15
  • 16. Infrastructure layer: running services every IT service model may be implemented using different physical or virtual resources (running services) and sub-services to re-use components and save time and money:… running services can execute several components of the same IT service running services can execute several components from different IT services e.g., web servers running front ends, DBs 16
  • 17. Infrastructure layer: the landscape virtual and physical nodes connected through interfaces located somewhere (for dependability and risk analysis purposes) full topology information may be described according to the required level of details PoSecCo uses full topology view for the configuration generation e.g., to configure all the firewalls and VPN terminators in the landscape 17
  • 18. The PoSecCo ontology(ies) business meta-model business ontology (?) IT layer meta-model IT layer ontology infrastructure meta-model infrastructure ontology extend concepts in meta-models with a semantically richer tool use the “inclusion” and “equivalence” features to link the separated ontologies 18
  • 19. Tools and formats meta-models as standard UML class diagrams from meta-models to models constrain the model derivation process to avoid integration issues XML representation in the PoSecCo repository meta-models models instances …ongoing effort ontologies represented in OWL 19
  • 20. PoSecCo and EffectPlus PoSecCo will provide: meta-models for services in a SP-oriented scenario layered architecture: business, IT and infrastructure full details in a document that will come soon inputs: test your service description with our model and provide us the missing requirements e.g., more info on service virtualization collaboration: a service modelling working group? common output: unified meta-model for Future Internet … agreed and adopted by all the EffectPlus partners (at least) 20
  • 22. Disclaimer EU Disclaimer PoSecCo project (project no. 257129) is partially supported/co-funded by the European Community/ European Union/EU under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D (FP7). This document does not represent the opinion of the European Community, and the European Community is not responsible for any use that might be made of its content. PoSecCo Disclaimer The information in this document is provided "as is", and no guarantee or warranty is given that the information is fit for any particular purpose. The above referenced consortium members shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials subject to any liability which is mandatory due to applicable law. 22
  • 23. 23
  • 24. 24