+ All Categories
Home > Software > Poster nci 2010

Poster nci 2010

Date post: 11-Feb-2017
Category:
Upload: bdemchak
View: 65 times
Download: 0 times
Share this document with a friend
1
PALMS-CI: A Policy-driven Cyberinfrastructure For the Exposure Biology Community Barry Demchak ([email protected] ), Jacqueline Kerr, Gregory Norman, Ernesto Ramirez, Fred Raab, Dane Lotspeich, Ingolf Krüger, and Kevin Patrick California Institute for Telecommunications and Information Technology, San Diego Division The Problem Build Cyberinfrastructures (CI) to serve stakeholder communities Support research workflows Workflows are templates to be customized by stakeholders Traditional development cycles are long & mis-target stakeholder concerns Healthy CIs solve all requirements simultaneously & continuously Solve Stakeholder Concerns Support emerging workflows Multifactor access control Confidentiality & privacy (HIPAA/IRB) High availability & reliability Scalability (bandwidth/storage/users) Auditability Provenance & curation Challenges Requirement elicitation Functional & quality requirements Crosscutting concerns Precise & accurate formulation Enactment Low latency to implementation Faithful to original requirement Conflict & error detection Scalable to large data flows End-to-end Traceability The Solution Model-based Policy Elicitation Stakeholders specify policies directly 1,2 on workflow models (UML Activity Diagrams 4 ) using visual Domain Specific Language (DSL 5 ) Policies specify alternate workflows & data flow transformations Cross-pollination of other requirement domains Service Oriented Architecture logical/deployment models Leverage standard patterns 3 : strategy, messaging, routing, & composite pattern (i.e., systems-of-systems) Leverage role-based interaction, choreography, & interceptor techniques Future Work Policy Concerns Expand repertoire of policy patterns Define policy composition rules Code generation and deployment Conflict/completeness checking Scalable and distributed execution Domain Specific Language Leverage relationships with other visual notations (e.g., Business Process Modeling Notation) Alignment with additional policy patterns & domains This material is based upon work supported by the National Institutes of Health under Grant No 1U01CA130771-01and the National Science Foundation under Grant No CCF-0702791 f Cyberinfrastructures (CI) f f PALMS References P hysical A ctivity L ocation M easurement S ystem to understand where activity-related energy expenditure occurs in humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides framework for research and analysis, and has ultimate goal of discovering methods for engineering better health. An Internet-based research computing environment that supports data acquisition, data storage, data management, data integration, data mining, data visualization, and other computing and information processing services. Different stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else the integrity of the CI degrades. 1. J. Juerjens. Security Systems Development with UML. Springer-Verlag Berlin Heidelberg, 2003. 2. T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proceedings of the 5 th International Conference on The Unified Modeling Language. pp426-441. Springer Verlag, 2002. 3. M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. Krüger, and M. Menarini. Rich Services: The Integration Piece of the SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul. 2007, pp. 176-183. 4. A. Bhattacharjee and R. Shyamasundar. Activity Diagrams: A Formal Framework to Model Business Processes and Code Generation. Journal of Object Technology. Vol 8, No 1, Jan 2009. 5. J. Viega. Building security requirements with CLASP. Proceedings of the 2005 Workshop on Software Engineering for Secure Systems – Building Trustworthy Applications. St Louis, MO, 2005. PALMS Cyberinfrastructure Sensor Data PALMS Browser Stakeholder Policies Shared Data
Transcript
Page 1: Poster   nci 2010

PALMS-CI: A Policy-driven CyberinfrastructureFor the Exposure Biology Community

Barry Demchak ([email protected]), Jacqueline Kerr, Gregory Norman, Ernesto Ramirez, Fred Raab, Dane Lotspeich, Ingolf Krüger, and Kevin Patrick

California Institute for Telecommunications and Information Technology, San Diego Division

The Problem

Build Cyberinfrastructures (CI)† to serve stakeholder communities• Support research workflows• Workflows are templates to be

customized by stakeholders• Traditional development cycles are

long & mis-target stakeholder concerns

• Healthy CIs solve all requirements simultaneously & continuously

Solve Stakeholder Concerns• Support emerging workflows• Multifactor access control• Confidentiality & privacy (HIPAA/IRB)• High availability & reliability• Scalability (bandwidth/storage/users)• Auditability• Provenance & curation

Challenges

Requirement elicitation• Functional & quality requirements• Crosscutting concerns• Precise & accurate formulation

Enactment• Low latency to implementation• Faithful to original requirement• Conflict & error detection• Scalable to large data flows

End-to-end Traceability

The Solution

Model-based Policy Elicitation• Stakeholders specify policies

directly1,2 on workflow models (UML Activity Diagrams4) using visual Domain Specific Language (DSL5)

• Policies specify alternate workflows & data flow transformations

• Cross-pollination of other requirement domains

Service Oriented Architecture logical/deployment models• Leverage standard patterns3:

strategy, messaging, routing, & composite pattern (i.e., systems-of-systems)

• Leverage role-based interaction, choreography, & interceptor techniques

Future Work

Policy Concerns• Expand repertoire of policy patterns• Define policy composition rules• Code generation and deployment• Conflict/completeness checking• Scalable and distributed execution

Domain Specific Language• Leverage relationships with other

visual notations (e.g., Business Process Modeling Notation)

• Alignment with additional policy patterns & domains

This material is based upon work supported by the National Institutes of Health under Grant No 1U01CA130771-01and the National Science Foundation under Grant No CCF-0702791

f

†Cyberinfrastructures (CI) f

f

PALMS ReferencesPhysical Activity Location Measurement System to understand where activity-related energy expenditure occurs in humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides framework for research and analysis, and has ultimate goal of discovering methods for engineering better health.

An Internet-based research computing environment that supports data acquisition, data storage, data management, data integration, data mining, data visualization, and other computing and information processing services. Different stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else the integrity of the CI degrades.

1. J. Juerjens. Security Systems Development with UML. Springer-Verlag Berlin Heidelberg, 2003.2. T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proceedings of the

5th International Conference on The Unified Modeling Language. pp426-441. Springer Verlag, 2002.3. M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. Krüger, and M. Menarini. Rich Services: The Integration Piece of the

SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul. 2007, pp. 176-183.

4. A. Bhattacharjee and R. Shyamasundar. Activity Diagrams: A Formal Framework to Model Business Processes and Code Generation. Journal of Object Technology. Vol 8, No 1, Jan 2009.

5. J. Viega. Building security requirements with CLASP. Proceedings of the 2005 Workshop on Software Engineering for Secure Systems – Building Trustworthy Applications. St Louis, MO, 2005.

PALMS Cyberinfrastructure

Sensor Data

PALMS Browser

Stakeholder Policies

Shared Data

Recommended