SlideShare a Scribd company logo
Overview of Policies for Security
and Data Sharing
Ingolf Krüger
Barry Demchak
March 16, 2010
Roadmap
• PALMS (Physical Activity Location Measurement System)
• SOA Review
• PALMS Logical Architecture
• Policy and its composition
• Policy execution – relationship with caBIG
Feel free to ask questions!
PALMS Objectives
• Support data collection and analysis for exposure
biology studies
– Data capture from multiple devices
– Multiple analyses and recombination of data
– Sharing of data between investigators and projects
– Support multiple visualizations (local and remote)
• Extensible and Flexible
– Scalable for large data flows
– Support large number of investigators and studies
– Customizable datasets, calculations, and
visualizations
• HIPAA Compliant and Secure
PALMS Organization and Data Flow (CI)
Authorable & Discoverable
Study
Repository
Study
Repository
Visualizatio
n
Repository
Visualizatio
n
Repository
Calculation
Repository
Calculation
Repository
PALMS Community
PI
Study
Study
Study
PI
Study
Study
PI
Study
PALMSPALMS
StudyStudyStudy
Study
StudyStudy
PI PI
PI
Community
• Policy-driven access
control
– Subject data
– Study data
– Calculations
– Visualizations
• Secure
• HIPAA Compliance
• Customized Studies
• Collaboration
• Data Reuse
Browser
Excel,
Matlab…
Study
Repository
Study
Repository
Visualizatio
n Engine
Visualizatio
n Engine
Calculation
Engine
Calculation
Engine
Data Flow
PALMSPALMS
StudyStudyStudy
Study
StudyStudy
PI
RA
Define
Enter
Subjects
Enter
Observations
Refine
&
Start
Refine & Create
Guest
Study
Repository
Study
Repository
Visualizatio
n Engine
Visualizatio
n Engine
Calculation
Engine
Calculation
Engine
Policy
PALMSPALMS
StudyStudyStudy
Study
StudyStudy
PI
RA
Guest
Policy
Policy
Admin
Defines
Policy (def.):
Permission for
someone to act on
something
Uses
Applies
Policy (alt def.):
Conditional
replacement of one
workflow with
another
Services and SOA
• Loose Coupling
• Late Binding
• Scalability
• Composition
• Interoperability
• Testability
Network
Implementation
Single Server,
Multiple
Processes
Single
Application,
Linked Modules
Logical Deployment
• Malleability
• Manageability
• Dependability
• Incremental development
Logical Architecture (Preview)
Composing Workflow and Policy
• Define and implement Policy Concerns
– A class of policy decision embedded in a workflow
– Characterized by a contract for workflow and dataflow
– Supports reasoning regarding application correctness,
completeness, and contradiction
– Instantiated as policies inserted by stakeholders at either
design time or runtime
If user in [“PIs”, “RAs”, “Guests”]
Continue
Else
Reply “Failure”
Groups and Roles
If user in [“PIs”, “RAs”, “Guests”]
Continue
Else
Reply “Failure”
• Internet2 Grouper
– Hierarchical group
management
– Single point of control
– Permission-based
administration
– Virtual organizations
(VOs)
Identity
If user in [“PIs”, “RAs”, “Guests”]
Continue
Else
Reply “Failure”
• Establishing
– What I have (token)
– What I know (password)
– What I am (biometric)
• Referencing
– Trust relationships
(certification authorities)
– X509 Certificate
– SAML Certificate
– OpenID
Browser Application
3
2
1
Certificate
4
5
User ID &
Password Confirm
ID Provider
caBIG
cancer Biomedical Informatics Grid
– Connects scientists & practitioners: shareable & interoperable infrastructure
– Develop standard rules & common language: easily share information
– Tools: collecting, analyzing, integrating, disseminating cancer information
– Cornerstones
– Federation
– Open development
– Open access
– Open source
– Workspaces
– Clinical Trial Management
– Integrative Cancer Research
– Tissue Banks and Pathology
– Vocabularies & Common Data Elements
– Architecture
– Strategic Planning
– Data Sharing and Intellectual Capital
– Training
caGrid & GAARDS
• Grid Authentication & Authorization with Reliably Distributed Services
– Services & Tools for enforcement of security policy in enterprise grid
– Developed on Globus Toolkit
– Provides
– grid user management
– identity federation
– trust fabric provisioning and management
– group/VO management
– access control policy management and enforcement
– credential delegation
– web SSO
– integration between security domains & grid security domain
caGrid & GAARDS
Relationship to PALMS
• Pros
– Well supported
– caGrid Knowledge Center (Justin Permer/Ohio State
Bioinformatics)
– Professionally managed
– Well developed governance and development models
– Standards-based
– Security: X509 & SAML
– Ontologies: Thesaurus and Metathesaurus
– Sharing infrastructure
– Growing community
• Cons
– Key infrastructure out of our direct control
Questions??
Backup
slides
Composing Workflow and Policy
Scenario: Add Policy to Existing Workflow
(CNN | BBC) > story > if(authorized) > email(story,”x@ucsd.edu”)
• Key issues
– What is policy to compose?
– Where to insert policy? ... capture all paths?
– How to compose multiple policies?
– How to guarantee integrity of workflow?
– Preview: We have to address these
• Current methodologies
– Requirement discovery and hand coding
– Policy-based design & Inversion of Control
– Aspect Oriented Programming
– UML sequence chart composition
• New methodology (preview)
– ORCA
Architecture Definition Methodology
Rich Services VirtualNetwork
Rich Services
RAS4
Services
Service S 1
Roles
U1
U2
U3
U4
U5
Use Case Graph
Concerns
C1 C2 C3
C4
CC1
CC2CC3
Domain Model
R1 R2
R3 R4
R5 R6
R1 R2
msg
R3
CC1
CC2
Role Domain Model
R1 R2
R3 R4
R5 R6
CC1 CC2 CC3
Router/Interceptor
Messenger /Communicator
RAS1 RAS2
CC1 CC4 CC5
Router /Interceptor
Messenger / Communicator
RAS5 RAS6RAS3
S
/
D
S
/
D
RIS:
RIS:
ServiceElicitationRichServiceArchitecture
RAS7
Systemof Systems Topology
H1 H2
H3
H5
H6
H7
H8
H9
H4
RAS1 RAS2 RAS3
RAS5 RAS6 RAS7
Infrastructure Mapping
H1:RAS1 H2:RAS2
H3:CC1
H5:RAS2
H6:RAS5
H7:RAS7H8:RAS7
H9:RAS6
H4:RAS3Optimization
Implementation
RAS1 RAS 2
RAS3 RAS 4
RAS5 RAS 6
RAS7 CC1
CC2 CC3
CC4 CC5
Analysis
Synthesis
Analysis
Identification
Definition
Consolidation
Refinement
Hierarchic
composition
Refinement
Logical Model
SystemArchitecture
Definition
Logical Architecture Loop
DeploymentLoop
User View
Data Flow (Today)
Data Flow (Analysis-centric)
Data Flow (Algebraic)
Artifacts
• User Stories
• Use Cases
• Access Control Patterns
• Domain Modeling
• Dataflow
• Low Fidelity UI
• Service Definitions
• Rich Service
Requirements
Modeling
Service
Modeling
Use Cases
Use Case Attributes
• ID
• Name
• Priority
• Complexity
• Release Number
• Last Revised
• Description
• Actors (Primary and Secondary)
• Stakeholders
• Pre-Conditions
• Constraints
• Post-Conditions
• Triggers
• Cross References
• Flow of Events
– Basic Flow
– Alternative Flows
– Exceptions
• Extensions
• Information Requirements
• Special Requirements
• Frequency of Use
• Assumptions
• Issues and Considerations
– Issues
– Consideration
• Process Flows
• Related Use Cases
RA signs in
RA selects
study
RA uploads
.CSV and .GPX files
PALMS displays summary
RA confirms summary
PALMS commits
dataset
PALMS abandons
dataset
Display error
Display error
All files missing
or invalid
Time range
overlaps
accept decline
Low Fidelity User Interface
Domain Modeling (Overview)
Domain Modeling
Rich Service
Service Interactions (AAI)
Service Interactions (Calculation)
alt
alt
Web
Browser
PALMS Study
Calculation
Engine
StartCalculation(study, protocolID, paramBlockID, resultName)
StartResult
- study
+ study
Start Calculation
Results
Repository
Initiate Result
AddResult(resultName, protocolID, paramBlock)
AddResult
Protocol
Repository
GetProtocolParams(protocolID, paramBlockID)
Get Param Block
ParamBlockResult
The Road ForwardComponent Interactions
Client Server Server
Google Web Toolkit
(GWT)
Mule Enterprise
Service Bus
PALMS Products
• Integration
– Mapping Engines
– Data Mining Engines
– Social Networks
– Disaster Management
• Alerts and Events
• Data Subscriptions
• Data Flow Analysis (provenance flow)
• Scalable and Configurable Calculations
• Collaboration
Questions??

More Related Content

PDF
Smart migration Solution overview
Marc St-Pierre
 
PPTX
PhD Projects in Weka Research Help
PhD Services
 
PPTX
PhD Projects in Software Defined Networking Research Help
PhD Services
 
PPTX
PhD Projects in Visual Cryptography Research Guidance
PhD Services
 
PDF
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX
 
PDF
II-SDV 2016 Patrick Beaucamp - Data Science with R and Vanilla Air
Dr. Haxel Consult
 
PDF
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
Sabrina Kirrane
 
PDF
II-SDV 2016 - QWAM Content Intelligence
Dr. Haxel Consult
 
Smart migration Solution overview
Marc St-Pierre
 
PhD Projects in Weka Research Help
PhD Services
 
PhD Projects in Software Defined Networking Research Help
PhD Services
 
PhD Projects in Visual Cryptography Research Guidance
PhD Services
 
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX
 
II-SDV 2016 Patrick Beaucamp - Data Science with R and Vanilla Air
Dr. Haxel Consult
 
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
Sabrina Kirrane
 
II-SDV 2016 - QWAM Content Intelligence
Dr. Haxel Consult
 

Viewers also liked (6)

PPT
Big data
Palash Jain
 
PPTX
Security bigdata
Jitendra Chauhan
 
PPTX
Big data security challenges and recommendations!
cisoplatform
 
PPTX
Information Security in Big Data : Privacy and Data Mining
wanani181
 
PDF
Big Data: Its Characteristics And Architecture Capabilities
Ashraf Uddin
 
PPTX
What is Big Data?
Bernard Marr
 
Big data
Palash Jain
 
Security bigdata
Jitendra Chauhan
 
Big data security challenges and recommendations!
cisoplatform
 
Information Security in Big Data : Privacy and Data Mining
wanani181
 
Big Data: Its Characteristics And Architecture Capabilities
Ashraf Uddin
 
What is Big Data?
Bernard Marr
 
Ad

Similar to Overview of policies for security and data sharing (20)

PPT
Poster nci 2010
bdemchak
 
PPTX
Hicss 2012 presentation
bdemchak
 
PPTX
Palms v
bdemchak
 
PPT
Poster jsoe research expo 2009
bdemchak
 
PPTX
Poster jsoe research expo 2011
bdemchak
 
PPT
Grid And Healthcare For IOM July 2009
Ian Foster
 
PPT
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
Wansoo Im
 
PDF
NIST Big Data Public WG : Security and Privacy v2
Mark Underwood
 
PPT
Grid Computing July 2009
Ian Foster
 
PPT
Services For Science April 2009
Ian Foster
 
PPTX
An Overview of VIEW
Shiyong Lu
 
PPTX
Poster jsoe research expo 2012
bdemchak
 
PDF
NHIN Privacy & Security
Brian Ahier
 
PDF
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Emil Lupu
 
PPT
Aaas Data Intensive Science And Grid
Ian Foster
 
PPT
Knowledge Infrastructure for Global Systems Science
David De Roure
 
PPT
Computing Outside The Box June 2009
Ian Foster
 
PDF
Security and Usability: Designing Security Tooling That Roboticists Can Use
Ruffin White
 
PDF
OeRC Seminar
seanb
 
PDF
Secure data management, analysis, infrastructure and policy in an internation...
Carolyn Ten Holter
 
Poster nci 2010
bdemchak
 
Hicss 2012 presentation
bdemchak
 
Palms v
bdemchak
 
Poster jsoe research expo 2009
bdemchak
 
Poster jsoe research expo 2011
bdemchak
 
Grid And Healthcare For IOM July 2009
Ian Foster
 
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
Wansoo Im
 
NIST Big Data Public WG : Security and Privacy v2
Mark Underwood
 
Grid Computing July 2009
Ian Foster
 
Services For Science April 2009
Ian Foster
 
An Overview of VIEW
Shiyong Lu
 
Poster jsoe research expo 2012
bdemchak
 
NHIN Privacy & Security
Brian Ahier
 
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Emil Lupu
 
Aaas Data Intensive Science And Grid
Ian Foster
 
Knowledge Infrastructure for Global Systems Science
David De Roure
 
Computing Outside The Box June 2009
Ian Foster
 
Security and Usability: Designing Security Tooling That Roboticists Can Use
Ruffin White
 
OeRC Seminar
seanb
 
Secure data management, analysis, infrastructure and policy in an internation...
Carolyn Ten Holter
 
Ad

More from bdemchak (20)

PPTX
Cytoscape Network Visualization and Analysis
bdemchak
 
PDF
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
bdemchak
 
PDF
Cytoscape Cyberinfrastructure
bdemchak
 
PDF
No More Silos! Cytoscape CI Enables Interoperability
bdemchak
 
PPTX
Cytoscape CI Chapter 2
bdemchak
 
PPT
Composable Chat Introduction
bdemchak
 
PPT
Rich Services: Composable chat
bdemchak
 
PPT
Ucsd tum workshop bd
bdemchak
 
PPT
Rich Feeds for RESCUE and PALMS
bdemchak
 
PPT
Iscram 2008 presentation
bdemchak
 
PPT
Rich feeds policy, the cloud, and CAP
bdemchak
 
PPT
Rich services to the Rescue
bdemchak
 
PPTX
Policy 2012 presentation
bdemchak
 
PPT
Rich feeds for rescue an integration story
bdemchak
 
PPT
Background scenario drivers and critical issues with a focus on technology ...
bdemchak
 
PPT
Rich feeds for rescue, palms cyberinfrastructure integration stories
bdemchak
 
PPT
Data quality and uncertainty visualization
bdemchak
 
PPTX
Web programming in clojure
bdemchak
 
PPTX
Structure and interpretation of computer programs modularity, objects, and ...
bdemchak
 
PPT
Requirements engineering from system goals to uml models to software specif...
bdemchak
 
Cytoscape Network Visualization and Analysis
bdemchak
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
bdemchak
 
Cytoscape Cyberinfrastructure
bdemchak
 
No More Silos! Cytoscape CI Enables Interoperability
bdemchak
 
Cytoscape CI Chapter 2
bdemchak
 
Composable Chat Introduction
bdemchak
 
Rich Services: Composable chat
bdemchak
 
Ucsd tum workshop bd
bdemchak
 
Rich Feeds for RESCUE and PALMS
bdemchak
 
Iscram 2008 presentation
bdemchak
 
Rich feeds policy, the cloud, and CAP
bdemchak
 
Rich services to the Rescue
bdemchak
 
Policy 2012 presentation
bdemchak
 
Rich feeds for rescue an integration story
bdemchak
 
Background scenario drivers and critical issues with a focus on technology ...
bdemchak
 
Rich feeds for rescue, palms cyberinfrastructure integration stories
bdemchak
 
Data quality and uncertainty visualization
bdemchak
 
Web programming in clojure
bdemchak
 
Structure and interpretation of computer programs modularity, objects, and ...
bdemchak
 
Requirements engineering from system goals to uml models to software specif...
bdemchak
 

Recently uploaded (20)

PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PDF
Bandai Playdia The Book - David Glotz
BluePanther6
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PDF
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PPTX
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
PPTX
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PDF
Jenkins: An open-source automation server powering CI/CD Automation
SaikatBasu37
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
PPTX
oapresentation.pptx
mehatdhavalrajubhai
 
PPTX
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
DOCX
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
Bandai Playdia The Book - David Glotz
BluePanther6
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
Jenkins: An open-source automation server powering CI/CD Automation
SaikatBasu37
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
oapresentation.pptx
mehatdhavalrajubhai
 
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 

Overview of policies for security and data sharing

  • 1. Overview of Policies for Security and Data Sharing Ingolf Krüger Barry Demchak March 16, 2010
  • 2. Roadmap • PALMS (Physical Activity Location Measurement System) • SOA Review • PALMS Logical Architecture • Policy and its composition • Policy execution – relationship with caBIG Feel free to ask questions!
  • 3. PALMS Objectives • Support data collection and analysis for exposure biology studies – Data capture from multiple devices – Multiple analyses and recombination of data – Sharing of data between investigators and projects – Support multiple visualizations (local and remote) • Extensible and Flexible – Scalable for large data flows – Support large number of investigators and studies – Customizable datasets, calculations, and visualizations • HIPAA Compliant and Secure
  • 4. PALMS Organization and Data Flow (CI) Authorable & Discoverable
  • 5. Study Repository Study Repository Visualizatio n Repository Visualizatio n Repository Calculation Repository Calculation Repository PALMS Community PI Study Study Study PI Study Study PI Study PALMSPALMS StudyStudyStudy Study StudyStudy PI PI PI Community • Policy-driven access control – Subject data – Study data – Calculations – Visualizations • Secure • HIPAA Compliance • Customized Studies • Collaboration • Data Reuse Browser Excel, Matlab…
  • 6. Study Repository Study Repository Visualizatio n Engine Visualizatio n Engine Calculation Engine Calculation Engine Data Flow PALMSPALMS StudyStudyStudy Study StudyStudy PI RA Define Enter Subjects Enter Observations Refine & Start Refine & Create Guest
  • 8. Services and SOA • Loose Coupling • Late Binding • Scalability • Composition • Interoperability • Testability Network Implementation Single Server, Multiple Processes Single Application, Linked Modules Logical Deployment • Malleability • Manageability • Dependability • Incremental development
  • 10. Composing Workflow and Policy • Define and implement Policy Concerns – A class of policy decision embedded in a workflow – Characterized by a contract for workflow and dataflow – Supports reasoning regarding application correctness, completeness, and contradiction – Instantiated as policies inserted by stakeholders at either design time or runtime If user in [“PIs”, “RAs”, “Guests”] Continue Else Reply “Failure”
  • 11. Groups and Roles If user in [“PIs”, “RAs”, “Guests”] Continue Else Reply “Failure” • Internet2 Grouper – Hierarchical group management – Single point of control – Permission-based administration – Virtual organizations (VOs)
  • 12. Identity If user in [“PIs”, “RAs”, “Guests”] Continue Else Reply “Failure” • Establishing – What I have (token) – What I know (password) – What I am (biometric) • Referencing – Trust relationships (certification authorities) – X509 Certificate – SAML Certificate – OpenID Browser Application 3 2 1 Certificate 4 5 User ID & Password Confirm ID Provider
  • 13. caBIG cancer Biomedical Informatics Grid – Connects scientists & practitioners: shareable & interoperable infrastructure – Develop standard rules & common language: easily share information – Tools: collecting, analyzing, integrating, disseminating cancer information – Cornerstones – Federation – Open development – Open access – Open source – Workspaces – Clinical Trial Management – Integrative Cancer Research – Tissue Banks and Pathology – Vocabularies & Common Data Elements – Architecture – Strategic Planning – Data Sharing and Intellectual Capital – Training
  • 14. caGrid & GAARDS • Grid Authentication & Authorization with Reliably Distributed Services – Services & Tools for enforcement of security policy in enterprise grid – Developed on Globus Toolkit – Provides – grid user management – identity federation – trust fabric provisioning and management – group/VO management – access control policy management and enforcement – credential delegation – web SSO – integration between security domains & grid security domain
  • 16. Relationship to PALMS • Pros – Well supported – caGrid Knowledge Center (Justin Permer/Ohio State Bioinformatics) – Professionally managed – Well developed governance and development models – Standards-based – Security: X509 & SAML – Ontologies: Thesaurus and Metathesaurus – Sharing infrastructure – Growing community • Cons – Key infrastructure out of our direct control
  • 19. Composing Workflow and Policy Scenario: Add Policy to Existing Workflow (CNN | BBC) > story > if(authorized) > email(story,”[email protected]”) • Key issues – What is policy to compose? – Where to insert policy? ... capture all paths? – How to compose multiple policies? – How to guarantee integrity of workflow? – Preview: We have to address these • Current methodologies – Requirement discovery and hand coding – Policy-based design & Inversion of Control – Aspect Oriented Programming – UML sequence chart composition • New methodology (preview) – ORCA
  • 20. Architecture Definition Methodology Rich Services VirtualNetwork Rich Services RAS4 Services Service S 1 Roles U1 U2 U3 U4 U5 Use Case Graph Concerns C1 C2 C3 C4 CC1 CC2CC3 Domain Model R1 R2 R3 R4 R5 R6 R1 R2 msg R3 CC1 CC2 Role Domain Model R1 R2 R3 R4 R5 R6 CC1 CC2 CC3 Router/Interceptor Messenger /Communicator RAS1 RAS2 CC1 CC4 CC5 Router /Interceptor Messenger / Communicator RAS5 RAS6RAS3 S / D S / D RIS: RIS: ServiceElicitationRichServiceArchitecture RAS7 Systemof Systems Topology H1 H2 H3 H5 H6 H7 H8 H9 H4 RAS1 RAS2 RAS3 RAS5 RAS6 RAS7 Infrastructure Mapping H1:RAS1 H2:RAS2 H3:CC1 H5:RAS2 H6:RAS5 H7:RAS7H8:RAS7 H9:RAS6 H4:RAS3Optimization Implementation RAS1 RAS 2 RAS3 RAS 4 RAS5 RAS 6 RAS7 CC1 CC2 CC3 CC4 CC5 Analysis Synthesis Analysis Identification Definition Consolidation Refinement Hierarchic composition Refinement Logical Model SystemArchitecture Definition Logical Architecture Loop DeploymentLoop
  • 25. Artifacts • User Stories • Use Cases • Access Control Patterns • Domain Modeling • Dataflow • Low Fidelity UI • Service Definitions • Rich Service Requirements Modeling Service Modeling
  • 27. Use Case Attributes • ID • Name • Priority • Complexity • Release Number • Last Revised • Description • Actors (Primary and Secondary) • Stakeholders • Pre-Conditions • Constraints • Post-Conditions • Triggers • Cross References • Flow of Events – Basic Flow – Alternative Flows – Exceptions • Extensions • Information Requirements • Special Requirements • Frequency of Use • Assumptions • Issues and Considerations – Issues – Consideration • Process Flows • Related Use Cases RA signs in RA selects study RA uploads .CSV and .GPX files PALMS displays summary RA confirms summary PALMS commits dataset PALMS abandons dataset Display error Display error All files missing or invalid Time range overlaps accept decline
  • 28. Low Fidelity User Interface
  • 33. Service Interactions (Calculation) alt alt Web Browser PALMS Study Calculation Engine StartCalculation(study, protocolID, paramBlockID, resultName) StartResult - study + study Start Calculation Results Repository Initiate Result AddResult(resultName, protocolID, paramBlock) AddResult Protocol Repository GetProtocolParams(protocolID, paramBlockID) Get Param Block ParamBlockResult
  • 34. The Road ForwardComponent Interactions Client Server Server Google Web Toolkit (GWT) Mule Enterprise Service Bus
  • 35. PALMS Products • Integration – Mapping Engines – Data Mining Engines – Social Networks – Disaster Management • Alerts and Events • Data Subscriptions • Data Flow Analysis (provenance flow) • Scalable and Configurable Calculations • Collaboration

Editor's Notes

  • #2: <number> Thank the host!
  • #6: In the beginning: PIs have their studies, and their studies have their data, calculations, and visualizations ----- Insight: Studies can be managed centrally; calculations and visualizations can be reused; collaborations can occur with data, calculations, and visualizations Click 1: Enter PALMS, an Internet-based facility for managing research Click 2: The main features of PALMS: the study repository, calculation repository, and visualization repository Click 3: Community uses PALMS to manage studies, provide calculations, and provide visualizations Click 4: Policy -> HIPAA, Collaboration, etc
  • #7: PALMS is a role-based system. Data flows are associated with particular roles and particular targets Click 1: A PI can define what data a study retains, what calculations can be made, and what visualizations can be made Click 2: An RA can enter subject and observation information Click 3: Once the information exists in the study, the RA can send it to a calculation engine, and then to a visualizer Click 4: A guest cannot enter data, but can get calculations and visualizations All data flows and requests are subject to policy (next slide)
  • #8: Policy can be defined at both the PALMS system level and at the study level Click 1: What is a policy? Click 2: Who defines policies?? … it depends on the policy … (RAs can define policies that affect guests) Click 3: An example: A guest wants to run a calculation and get a visualization Click 4: Policy at both the PALMS and study level apply to allow/reject the operation, or to constrain or shape it Important points: - Policy can be used for access control and HIPAA enforcement. - Policy engines monitor all transactions. - Policy engines not only enforce permissions, but they also cause audit logging - Engines similar to the policy engines can also perform encryption, anonymization, decimation, failure management, and so on
  • #11: Current methodologies Requirement discovery and hand coding Policy-based design & Inversion of Control Aspect Oriented Programming UML sequence chart composition New methodology (preview) ORCA
  • #20: Add Authentication policy into CNN/BBC workflow … see red decision-making <<<<CLICK>>>> In ORC, see the same decision being inserted <<<<CLICK>>>> <<Go over key issues>> To solve the policy insertion problem, we have to solve these <<<<CLICK>>>> Show existing well-known solutions … not reactive to stakeholder policy insertion <<<<CLICK>>>> ORCA is part of solution … specifies WHAT and WHERE