SlideShare ist ein Scribd-Unternehmen logo
1 von 30
PALMS:
A Modern Coevolution of
Community and Computing Using
Policy Driven Development
HICSS 2012
Maui, HI
January 5, 2012
Barry Demchak
1
Motivation
???
2
Study
Repository
Visualization
Repository
Calculation
Repository
Observation and Solution
PI
Study
Study
Study
PI
Study
Study
PI
Study
PALMS
StudyStudyStudy
Study
StudyStudy
PI PI
PI
Community
• Policy-driven access
control
– Subject data
– Study data
– Calculations
– Visualizations
• Secure
• HIPAA Compliance
• Customized Studies
• Collaboration
• Data Reuse
Browser
Excel,
Matlab…
Personal Activity Location
Measurement System
• Understanding where activity-
related energy expenditure
occurs in time and space
3
• Common Research Interests
– Geospatial activity data based on wearable devices
– Activity classification based on trips
– Engineering better health
• Common Problems
– Safe and secure data storage
– Trip and activity classification algorithms
– Transfer of analysis to visualization
– Funding
• The PALMS Strategy
– Build it and they will come?
Community Drivers
4
Roadmap
• Approach to PALMS Community development
• PALMS technical requirements
• Rationale for Policy Driven Design
• Mechanics of Policy Driven Design
• Example of policy injection and policies
• Feature injection
5
Emerging PALMS Community
• Engagement
– 20+ groups internationally (mostly non-NSF/NIH)
– Advisory Board and online surveys (SurveyMonkey)
– Early adopters
– Existing networks (GPSHRN, ALR, IPEN) – newsletters and co-grants
– 1st Annual International PALMS User Conference
• Lowering Barriers to Entry
– Introduction and instruction video
– User documentation
– IRB and grant language
– Scientific validity – validated algorithms
– Revenue model
– Preloading data & PALMSCom
• Incremental scaling
– Distributed models (calculation execution, data storage, server, authorship)
– File Sharing (concentric rings) & social networks
6
The Technical Requirement
• Technical Requirements
– Support research workflows
– Security and privacy
– High reliability and availability
– Scalability (bandwidth/storage/users)
– Auditability
– Provenance and curation
• Key Insights
– All stakeholders must have requirements met, or CI degrades
– Existing development models have long latencies
– Requirements are often lost in translation
– Success of CI depends on
– Accurate, timely, and continuous requirement elicitation
– Precise requirement formulation
– Low implementation latency
– Automatic requirement composition
7
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
– Services loosely coupled
– Late binding
– Scalability
– Testable
– Interoperable
– Incremental development
– Composition
– Services can be hierarchically decomposed
8
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
– Services loosely coupled
– Service interactions can be intercepted
– Services can be hierarchically decomposed
Producer Database
OK
StoreData(xxx)
Time
9
Access Control
Producer Database
Message Bus
StoreData(xxx)
OK
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
– Services loosely coupled
– Service interactions can be intercepted
– Services can be hierarchically decomposed
Event
Logger
Policy
Service/
Data
Connector
Community
Calculation
Repository
PALMS Service
Service/
Data
Connector
Device
Repository
Calculation
Repository
Study Repository
Observation
Repository
Subject
Repository
Failure Detection/
Mitigation
Result
Repository
Community
Device
Repository
Event
Logger
Policy
Failure Detection/
Mitigation
Browser User Interface
10
Study
Repository
Visualization
Engine
Calculation
Engine
PALMS
StudyStudyStudy
Study
StudyStudy
PI
RA
Enter
Subjects
Enter
Observations
Guest
Real Workflows
11
Study
Repository
Visualization
Engine
Calculation
Engine
PALMS
StudyStudyStudy
Study
StudyStudy
PI
RA
Guest
Policy
Policy
Admin
Policy in Action
Policy (def.): Permission
for someone to act on
something
12
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
• Workflows as service compositions
User
Interface
Device
Repository
GetList(userID)
DeviceID[]
Show Devices
Screen
Get
Device List
Show
Device List
UI UIPALMS
13
A Workflow and Policy Case Study
Filter by Role
User
Interface
Device
Repository
Policy: Reject
Role(userID)PI
GetList(userID)
DeviceID[]
Err: Reject
… or ...
{
Allow only PIs
Show Devices
Screen
Get
Device List
Show
Device List
UI UIPALMS
User
Interface
Device
Repository
Policy: Filter
Device Records
by Role(userID)
GetList(userID)
DeviceID[]
14
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
• Workflows as service compositions
• Policy injection
– Policy evaluation
– Domain Specific Language (DSLs)
User
Interface
Device
Repository
Policy
Engine
GetList(userID)
GetList(userID)
DeviceID[]
DeviceID[]'
Policy: Reject
Role(userID)PI
Err: RejectEvent
Logger
Policy
Service/
Data
Connector
Community
Calculation
Repository
PALMS Service
Failure Detection/
Mitigation
Community
Device
Repository
Browser User Interface
15
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
• Workflows as service compositions
• Policy injection
– Policy evaluation
– Domain Specific Language (DSLs)
if ($UserID = '/O=caBIG/CN=bdemchak')
then () (: execute normal flow :)
else return 'Err:Reject'
if (palms:subject-in-study-role('PI')
then () (: execute normal flow :)
else return 'Err:Reject'
DeviceListPolicy.templateReference = DeviceListTemplate
DeviceListPolicy.templateParameter.RoleList = PI
16
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
• Workflows as service compositions
• Policy injection
• Feature injection
– Policy System
– Auditing
– Provenance
Event
Logger
Policy
Service/
Data
Connector
Community
Calculation
Repository
PALMS Service
Failure Detection/
Mitigation
Community
Device
Repository
Browser User Interface
Policy
Engine
Policy
Repository
Policy UI
Event
Acquisition
Event
Repository
Audit UI
17
Success!
Event
Logger
Policy
Service/
Data
Connector
Community
Calculation
Repository
PALMS Service
Failure Detection/
Mitigation
Community
Device
Repository
Browser User Interface
18
Questions?
19
Service Orientation
Decomposition
Interception
Policy Injection Feature Composition
SPSS
ESRI
GPS Device
Accelerometer
Others
PALMS
Study StudyStudy
Study
Filtering Filtering Filtering
Scoring
Analyzing
Scoring Scoring
Analyzing Analyzing
External
Data
Subject
Data
Raw Data
Others
...
...
Google Maps Viewer Other Local Viewer
Data Flow (CI)
20
Rich Services
21
Messenger
Router/Interceptor
Policy
Service/Data
Connector
Messenger
Router/Interceptor
Failure
Manager
...
<<Rich Service>> S
Service/Data
Connector
...
<<Rich Service>> S.n
Service/Data
Connector }<<
Rich
Infrastructure
Services
>>
Encryption
Service/Data
Connector
Logging
Service/Data
Connector
Failure Manager
Service/Data
Connector
...
Service/Data
Connector
S.1
Service/Data
Connector
S.2
Service/Data
Connector
}<<
Rich
Application
Services
>>
S.n.2
Service/Data
Connector
S.n.m
Service/Data
Connector
}<<
Rich
Application
Services
>>
S.n.1
Service/Data
Connector
Service/Data
Connector
Logging
Service/Data
Connector
Encryption
Service/Data
Connector
Policy ...
Service/Data
Connector
Service/Data
Connector
<<
Rich
Infrastructure
Services
>>
}
From tightly to l o o s e l y coupled systems
Rich Service Blueprint
22
Event Logger
Access
Policies
PALMS Integration System
Integration
Adapter
Data
Repository
HIPAA
Policies
Service/
Data
Connector
Viewer
Viewer
Adapter
Consumer Systems
Service/
Data
ConnectorSensor
Adapter
Sensor
Producer Systems
Subject
Repository
Service/
Data
Connector
Authoring
Calculation
Repository
Calculation Systems
ExecutionPrototyping
Failure Detection/
Mitigation
Logical Architecture
23
Rich Services Virtual Network
Rich Services
RAS4
Services
Service S1
Roles
U1
U2
U3
U4
U5
Use Case Graph
Concerns
C1 C2 C3
C4
CC1
CC2CC3
Domain Model
R1 R2
R3 R4
R5 R6
R1 R2
msg
R3
CC1
CC2
Role Domain Model
R1 R2
R3 R4
R5 R6
CC1 CC2 CC3
Router/Interceptor
Messenger/Communicator
RAS1 RAS2
CC1 CC4 CC5
Router/Interceptor
Messenger/Communicator
RAS5 RAS6RAS3
S
/
D
S
/
D
RIS:
RIS:
ServiceElicitationRichServiceArchitecture
RAS7
System of Systems Topology
H1 H2
H3
H5
H6
H7
H8
H9
H4
RAS1 RAS2 RAS3
RAS5 RAS6 RAS7
Infrastructure Mapping
H1:RAS1 H2:RAS2
H3:CC1
H5:RAS2
H6:RAS5
H7:RAS7H8:RAS7
H9:RAS6
H4:RAS3
Optimization
Implementation
RAS1 RAS2
RAS3 RAS4
RAS5 RAS6
RAS7 CC1
CC2 CC3
CC4 CC5
Analysis
Synthesis
Analysis
Identification
Definition
Consolidation
Refinement
Hierarchic
composition
Refinement
Logical Model
SystemArchitecture
Definition
Logical Architecture Loop
Deployment Loop
Rich Service Development Process
24
Yesterday Today
Device A Device B Device C Subjects
Calculation 1
Result 1
• Calculations are complex
(includes tagging, hides
intermediate results)
• Results can’t be used in
calculations
Device A Device B Device C Subjects
Calculation 2
Result 3
Tagging
B
Tagging
C
Tagging
Subj
Tagging
A
Tagged
A
Tagged
B
Tagged
C
Tagged
Subj
Calculation 3
Result 2
• Finer grained calculations easier
to write and reuse
• Intermediate results can be
reused
• Results can be fed to calculations
Flexible Networks
25
Provenance
Device B Device C Subjects Calculation 1
Result 1
Today Tomorrow
Solution: Provenance
Tracking which calculations and
data contributed to a result
What went into Result1?
Device A Device B Device C Subjects
Calculation 2
Result 3
Tagging
B
Tagging
C
Tagging
Subj
Tagging
A
Tagged
A
Tagged
B
Tagged
C
Tagged
Subj
Calculation 3 Result 2
What went into Result3?
26
Spectrum of Sharing1
Trust Publish Interaction Quality Privacy Enablers
No one Nothing No one - - -
Friends &
Family
Subsets/
derivatives
Word of
mouth
Person to
person
Handshake
promise
None
Community ″ Conference
booths/
papers
Curation2 De-ident &
agreement
Auto de-ident,
Agreement
template3,4
Public ″ Repository/
registry
Taxonomies/
semantics
″ ″
1 C. Fennema-Notestine. Enabling Public Data Sharing: Encouraging Scientific Discovery and Education
2 Strong metadata, use common ontological framework, collection conditions & semantics, validated calculation &
visualization
3 Suggested IRB or HIPAA wording
4 Promise to not re-identify, use data at own risk, no quality guarantees, properly acknowledge data source
27
PALMSCom Mutual Support
UCSD PALMS
Support Team
User 1
User 2 User 3
User 4 User 5
28
PALMSCom Example
29
Deployment
Web Browser
(UI)
PALMS
Service
GWT RPC
Mule Messaging
Browser
Proxy (UI)
PALMS
Subservices
CXF Web Services
Mule Messaging
CXF Web Services
GWT RPC
PALMS Server VM
PC Browser PALMS Server Machine
JAVA (GWT) JAVA (Mule ESB)
30

Weitere ähnliche Inhalte

Andere mochten auch

Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chatbdemchak
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentationbdemchak
 
Introduction to es bs mule
Introduction to es bs   muleIntroduction to es bs   mule
Introduction to es bs mulebdemchak
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...bdemchak
 
Cytoscape ci chapter 1
Cytoscape ci chapter 1Cytoscape ci chapter 1
Cytoscape ci chapter 1bdemchak
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2bdemchak
 
Software safety in embedded systems &amp; software safety why, what, and how
Software safety in embedded systems &amp; software safety   why, what, and how Software safety in embedded systems &amp; software safety   why, what, and how
Software safety in embedded systems &amp; software safety why, what, and how bdemchak
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescuebdemchak
 
Uml introduction
Uml introductionUml introduction
Uml introductionbdemchak
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...bdemchak
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojurebdemchak
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualizationbdemchak
 
Introduction to soa composition
Introduction to soa compositionIntroduction to soa composition
Introduction to soa compositionbdemchak
 
Overview of policies for security and data sharing
Overview of policies for security and data sharingOverview of policies for security and data sharing
Overview of policies for security and data sharingbdemchak
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration storybdemchak
 
Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...bdemchak
 
Provinance in scientific workflows in e science
Provinance in scientific workflows in e scienceProvinance in scientific workflows in e science
Provinance in scientific workflows in e sciencebdemchak
 
Session 11.ppt
Session 11.pptSession 11.ppt
Session 11.pptTrivediViraj
 
Palm pilot case analysis for Harvard Summer School by AndrĂŠ Brant, AdrĂŠs Olea...
Palm pilot case analysis for Harvard Summer School by AndrĂŠ Brant, AdrĂŠs Olea...Palm pilot case analysis for Harvard Summer School by AndrĂŠ Brant, AdrĂŠs Olea...
Palm pilot case analysis for Harvard Summer School by AndrĂŠ Brant, AdrĂŠs Olea...Dr Ritesh Malik
 

Andere mochten auch (19)

Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chat
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentation
 
Introduction to es bs mule
Introduction to es bs   muleIntroduction to es bs   mule
Introduction to es bs mule
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
Cytoscape ci chapter 1
Cytoscape ci chapter 1Cytoscape ci chapter 1
Cytoscape ci chapter 1
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2
 
Software safety in embedded systems &amp; software safety why, what, and how
Software safety in embedded systems &amp; software safety   why, what, and how Software safety in embedded systems &amp; software safety   why, what, and how
Software safety in embedded systems &amp; software safety why, what, and how
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescue
 
Uml introduction
Uml introductionUml introduction
Uml introduction
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojure
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualization
 
Introduction to soa composition
Introduction to soa compositionIntroduction to soa composition
Introduction to soa composition
 
Overview of policies for security and data sharing
Overview of policies for security and data sharingOverview of policies for security and data sharing
Overview of policies for security and data sharing
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration story
 
Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...
 
Provinance in scientific workflows in e science
Provinance in scientific workflows in e scienceProvinance in scientific workflows in e science
Provinance in scientific workflows in e science
 
Session 11.ppt
Session 11.pptSession 11.ppt
Session 11.ppt
 
Palm pilot case analysis for Harvard Summer School by AndrĂŠ Brant, AdrĂŠs Olea...
Palm pilot case analysis for Harvard Summer School by AndrĂŠ Brant, AdrĂŠs Olea...Palm pilot case analysis for Harvard Summer School by AndrĂŠ Brant, AdrĂŠs Olea...
Palm pilot case analysis for Harvard Summer School by AndrĂŠ Brant, AdrĂŠs Olea...
 

Ähnlich wie Palms v

Jisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc RDM
 
SharePoint 2013 governance model
SharePoint 2013 governance modelSharePoint 2013 governance model
SharePoint 2013 governance modelYash Goley
 
Neo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Neo4j GraphTour Santa Monica 2019 - Amundsen PresentationNeo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Neo4j GraphTour Santa Monica 2019 - Amundsen PresentationTamikaTannis
 
Drive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event ProcessingDrive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event ProcessingPerficient, Inc.
 
Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Stephane Fellah
 
Geospatial Ontologies and GeoSPARQL Services
Geospatial Ontologies and GeoSPARQL ServicesGeospatial Ontologies and GeoSPARQL Services
Geospatial Ontologies and GeoSPARQL ServicesStephane Fellah
 
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...Capgemini
 
How Lyft Drives Data Discovery
How Lyft Drives Data DiscoveryHow Lyft Drives Data Discovery
How Lyft Drives Data DiscoveryNeo4j
 
Identity Management: Tools, processes & services
Identity Management: Tools, processes & servicesIdentity Management: Tools, processes & services
Identity Management: Tools, processes & servicesJISC Netskills
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...African Open Science Platform
 
Connected development data
Connected development dataConnected development data
Connected development dataRob Worthington
 
r.elativity Capabilities Summary
r.elativity Capabilities Summaryr.elativity Capabilities Summary
r.elativity Capabilities Summarybronzerocket
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachSoftServe
 
Assessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesAssessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesDATAVERSITY
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
The 5 Critical Pillars of Office 365 Readiness
The 5 Critical Pillars of Office 365 ReadinessThe 5 Critical Pillars of Office 365 Readiness
The 5 Critical Pillars of Office 365 ReadinessAdam Levithan
 
Paving the way to open and interoperable research data service workflows Prog...
Paving the way to open and interoperable research data service workflows Prog...Paving the way to open and interoperable research data service workflows Prog...
Paving the way to open and interoperable research data service workflows Prog...ResearchSpace
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Institut of Entrepreneurship & Management
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Institute of Information Systems (HES-SO)
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Geoffrey Fox
 

Ähnlich wie Palms v (20)

Jisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring Update
 
SharePoint 2013 governance model
SharePoint 2013 governance modelSharePoint 2013 governance model
SharePoint 2013 governance model
 
Neo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Neo4j GraphTour Santa Monica 2019 - Amundsen PresentationNeo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Neo4j GraphTour Santa Monica 2019 - Amundsen Presentation
 
Drive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event ProcessingDrive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event Processing
 
Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management
 
Geospatial Ontologies and GeoSPARQL Services
Geospatial Ontologies and GeoSPARQL ServicesGeospatial Ontologies and GeoSPARQL Services
Geospatial Ontologies and GeoSPARQL Services
 
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
 
How Lyft Drives Data Discovery
How Lyft Drives Data DiscoveryHow Lyft Drives Data Discovery
How Lyft Drives Data Discovery
 
Identity Management: Tools, processes & services
Identity Management: Tools, processes & servicesIdentity Management: Tools, processes & services
Identity Management: Tools, processes & services
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...
 
Connected development data
Connected development dataConnected development data
Connected development data
 
r.elativity Capabilities Summary
r.elativity Capabilities Summaryr.elativity Capabilities Summary
r.elativity Capabilities Summary
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric Approach
 
Assessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesAssessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use Cases
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
The 5 Critical Pillars of Office 365 Readiness
The 5 Critical Pillars of Office 365 ReadinessThe 5 Critical Pillars of Office 365 Readiness
The 5 Critical Pillars of Office 365 Readiness
 
Paving the way to open and interoperable research data service workflows Prog...
Paving the way to open and interoperable research data service workflows Prog...Paving the way to open and interoperable research data service workflows Prog...
Paving the way to open and interoperable research data service workflows Prog...
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
 

Mehr von bdemchak

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysisbdemchak
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...bdemchak
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructurebdemchak
 
No More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables InteroperabilityNo More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables Interoperabilitybdemchak
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introductionbdemchak
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSbdemchak
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentationbdemchak
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAPbdemchak
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentationbdemchak
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...bdemchak
 
Requirements vs design vs runtime
Requirements vs design vs runtimeRequirements vs design vs runtime
Requirements vs design vs runtimebdemchak
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecturebdemchak
 
Verification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesVerification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesbdemchak
 
Seda an architecture for well-conditioned scalable internet services
Seda   an architecture for well-conditioned scalable internet servicesSeda   an architecture for well-conditioned scalable internet services
Seda an architecture for well-conditioned scalable internet servicesbdemchak
 

Mehr von bdemchak (15)

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysis
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructure
 
No More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables InteroperabilityNo More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables Interoperability
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introduction
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMS
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentation
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAP
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentation
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...
 
Requirements vs design vs runtime
Requirements vs design vs runtimeRequirements vs design vs runtime
Requirements vs design vs runtime
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
Verification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesVerification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policies
 
Seda an architecture for well-conditioned scalable internet services
Seda   an architecture for well-conditioned scalable internet servicesSeda   an architecture for well-conditioned scalable internet services
Seda an architecture for well-conditioned scalable internet services
 

KĂźrzlich hochgeladen

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfWilly Marroquin (WillyDevNET)
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 

KĂźrzlich hochgeladen (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 

Palms v

  • 1. PALMS: A Modern Coevolution of Community and Computing Using Policy Driven Development HICSS 2012 Maui, HI January 5, 2012 Barry Demchak 1
  • 3. Study Repository Visualization Repository Calculation Repository Observation and Solution PI Study Study Study PI Study Study PI Study PALMS StudyStudyStudy Study StudyStudy PI PI PI Community • Policy-driven access control – Subject data – Study data – Calculations – Visualizations • Secure • HIPAA Compliance • Customized Studies • Collaboration • Data Reuse Browser Excel, Matlab… Personal Activity Location Measurement System • Understanding where activity- related energy expenditure occurs in time and space 3
  • 4. • Common Research Interests – Geospatial activity data based on wearable devices – Activity classification based on trips – Engineering better health • Common Problems – Safe and secure data storage – Trip and activity classification algorithms – Transfer of analysis to visualization – Funding • The PALMS Strategy – Build it and they will come? Community Drivers 4
  • 5. Roadmap • Approach to PALMS Community development • PALMS technical requirements • Rationale for Policy Driven Design • Mechanics of Policy Driven Design • Example of policy injection and policies • Feature injection 5
  • 6. Emerging PALMS Community • Engagement – 20+ groups internationally (mostly non-NSF/NIH) – Advisory Board and online surveys (SurveyMonkey) – Early adopters – Existing networks (GPSHRN, ALR, IPEN) – newsletters and co-grants – 1st Annual International PALMS User Conference • Lowering Barriers to Entry – Introduction and instruction video – User documentation – IRB and grant language – Scientific validity – validated algorithms – Revenue model – Preloading data & PALMSCom • Incremental scaling – Distributed models (calculation execution, data storage, server, authorship) – File Sharing (concentric rings) & social networks 6
  • 7. The Technical Requirement • Technical Requirements – Support research workflows – Security and privacy – High reliability and availability – Scalability (bandwidth/storage/users) – Auditability – Provenance and curation • Key Insights – All stakeholders must have requirements met, or CI degrades – Existing development models have long latencies – Requirements are often lost in translation – Success of CI depends on – Accurate, timely, and continuous requirement elicitation – Precise requirement formulation – Low implementation latency – Automatic requirement composition 7
  • 8. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) – Services loosely coupled – Late binding – Scalability – Testable – Interoperable – Incremental development – Composition – Services can be hierarchically decomposed 8
  • 9. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) – Services loosely coupled – Service interactions can be intercepted – Services can be hierarchically decomposed Producer Database OK StoreData(xxx) Time 9 Access Control Producer Database Message Bus StoreData(xxx) OK
  • 10. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) – Services loosely coupled – Service interactions can be intercepted – Services can be hierarchically decomposed Event Logger Policy Service/ Data Connector Community Calculation Repository PALMS Service Service/ Data Connector Device Repository Calculation Repository Study Repository Observation Repository Subject Repository Failure Detection/ Mitigation Result Repository Community Device Repository Event Logger Policy Failure Detection/ Mitigation Browser User Interface 10
  • 13. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) • Workflows as service compositions User Interface Device Repository GetList(userID) DeviceID[] Show Devices Screen Get Device List Show Device List UI UIPALMS 13
  • 14. A Workflow and Policy Case Study Filter by Role User Interface Device Repository Policy: Reject Role(userID)PI GetList(userID) DeviceID[] Err: Reject … or ... { Allow only PIs Show Devices Screen Get Device List Show Device List UI UIPALMS User Interface Device Repository Policy: Filter Device Records by Role(userID) GetList(userID) DeviceID[] 14
  • 15. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) • Workflows as service compositions • Policy injection – Policy evaluation – Domain Specific Language (DSLs) User Interface Device Repository Policy Engine GetList(userID) GetList(userID) DeviceID[] DeviceID[]' Policy: Reject Role(userID)PI Err: RejectEvent Logger Policy Service/ Data Connector Community Calculation Repository PALMS Service Failure Detection/ Mitigation Community Device Repository Browser User Interface 15
  • 16. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) • Workflows as service compositions • Policy injection – Policy evaluation – Domain Specific Language (DSLs) if ($UserID = '/O=caBIG/CN=bdemchak') then () (: execute normal flow :) else return 'Err:Reject' if (palms:subject-in-study-role('PI') then () (: execute normal flow :) else return 'Err:Reject' DeviceListPolicy.templateReference = DeviceListTemplate DeviceListPolicy.templateParameter.RoleList = PI 16
  • 17. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) • Workflows as service compositions • Policy injection • Feature injection – Policy System – Auditing – Provenance Event Logger Policy Service/ Data Connector Community Calculation Repository PALMS Service Failure Detection/ Mitigation Community Device Repository Browser User Interface Policy Engine Policy Repository Policy UI Event Acquisition Event Repository Audit UI 17
  • 20. SPSS ESRI GPS Device Accelerometer Others PALMS Study StudyStudy Study Filtering Filtering Filtering Scoring Analyzing Scoring Scoring Analyzing Analyzing External Data Subject Data Raw Data Others ... ... Google Maps Viewer Other Local Viewer Data Flow (CI) 20
  • 22. Messenger Router/Interceptor Policy Service/Data Connector Messenger Router/Interceptor Failure Manager ... <<Rich Service>> S Service/Data Connector ... <<Rich Service>> S.n Service/Data Connector }<< Rich Infrastructure Services >> Encryption Service/Data Connector Logging Service/Data Connector Failure Manager Service/Data Connector ... Service/Data Connector S.1 Service/Data Connector S.2 Service/Data Connector }<< Rich Application Services >> S.n.2 Service/Data Connector S.n.m Service/Data Connector }<< Rich Application Services >> S.n.1 Service/Data Connector Service/Data Connector Logging Service/Data Connector Encryption Service/Data Connector Policy ... Service/Data Connector Service/Data Connector << Rich Infrastructure Services >> } From tightly to l o o s e l y coupled systems Rich Service Blueprint 22
  • 23. Event Logger Access Policies PALMS Integration System Integration Adapter Data Repository HIPAA Policies Service/ Data Connector Viewer Viewer Adapter Consumer Systems Service/ Data ConnectorSensor Adapter Sensor Producer Systems Subject Repository Service/ Data Connector Authoring Calculation Repository Calculation Systems ExecutionPrototyping Failure Detection/ Mitigation Logical Architecture 23
  • 24. Rich Services Virtual Network Rich Services RAS4 Services Service S1 Roles U1 U2 U3 U4 U5 Use Case Graph Concerns C1 C2 C3 C4 CC1 CC2CC3 Domain Model R1 R2 R3 R4 R5 R6 R1 R2 msg R3 CC1 CC2 Role Domain Model R1 R2 R3 R4 R5 R6 CC1 CC2 CC3 Router/Interceptor Messenger/Communicator RAS1 RAS2 CC1 CC4 CC5 Router/Interceptor Messenger/Communicator RAS5 RAS6RAS3 S / D S / D RIS: RIS: ServiceElicitationRichServiceArchitecture RAS7 System of Systems Topology H1 H2 H3 H5 H6 H7 H8 H9 H4 RAS1 RAS2 RAS3 RAS5 RAS6 RAS7 Infrastructure Mapping H1:RAS1 H2:RAS2 H3:CC1 H5:RAS2 H6:RAS5 H7:RAS7H8:RAS7 H9:RAS6 H4:RAS3 Optimization Implementation RAS1 RAS2 RAS3 RAS4 RAS5 RAS6 RAS7 CC1 CC2 CC3 CC4 CC5 Analysis Synthesis Analysis Identification Definition Consolidation Refinement Hierarchic composition Refinement Logical Model SystemArchitecture Definition Logical Architecture Loop Deployment Loop Rich Service Development Process 24
  • 25. Yesterday Today Device A Device B Device C Subjects Calculation 1 Result 1 • Calculations are complex (includes tagging, hides intermediate results) • Results can’t be used in calculations Device A Device B Device C Subjects Calculation 2 Result 3 Tagging B Tagging C Tagging Subj Tagging A Tagged A Tagged B Tagged C Tagged Subj Calculation 3 Result 2 • Finer grained calculations easier to write and reuse • Intermediate results can be reused • Results can be fed to calculations Flexible Networks 25
  • 26. Provenance Device B Device C Subjects Calculation 1 Result 1 Today Tomorrow Solution: Provenance Tracking which calculations and data contributed to a result What went into Result1? Device A Device B Device C Subjects Calculation 2 Result 3 Tagging B Tagging C Tagging Subj Tagging A Tagged A Tagged B Tagged C Tagged Subj Calculation 3 Result 2 What went into Result3? 26
  • 27. Spectrum of Sharing1 Trust Publish Interaction Quality Privacy Enablers No one Nothing No one - - - Friends & Family Subsets/ derivatives Word of mouth Person to person Handshake promise None Community ″ Conference booths/ papers Curation2 De-ident & agreement Auto de-ident, Agreement template3,4 Public ″ Repository/ registry Taxonomies/ semantics ″ ″ 1 C. Fennema-Notestine. Enabling Public Data Sharing: Encouraging Scientific Discovery and Education 2 Strong metadata, use common ontological framework, collection conditions & semantics, validated calculation & visualization 3 Suggested IRB or HIPAA wording 4 Promise to not re-identify, use data at own risk, no quality guarantees, properly acknowledge data source 27
  • 28. PALMSCom Mutual Support UCSD PALMS Support Team User 1 User 2 User 3 User 4 User 5 28
  • 30. Deployment Web Browser (UI) PALMS Service GWT RPC Mule Messaging Browser Proxy (UI) PALMS Subservices CXF Web Services Mule Messaging CXF Web Services GWT RPC PALMS Server VM PC Browser PALMS Server Machine JAVA (GWT) JAVA (Mule ESB) 30