SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Rich Service Model
Policies
Policy
Evaluator
Requestor Fulfiller
Generic Workflow
Requestor
Fulfiller
Alternate
Fulfiller
1
2
1
4
2 3
2'
3'
Policy Evaluator
(injected at
runtime) If User in Researchers
then Fulfiller
else AlternateFulfiller
Policies
Policy
Evaluator
Requestor Fulfiller
Generic Workflow
Requestor
Fulfiller
Alternate
Fulfiller
1
3
1
2
5
4'
5'Policy Evaluator
returns service to
execute
Router
2
4 36
4Router
If User in Researchers
then [Fulfiller]
else [AlternateFulfiller]
Policy-driven Development
Just-In-Time Workflow Composition
Barry Demchak (bdemchak@ucsd.edu) & Ingolf KrĂźger
California Institute for Telecommunications and Information Technology, San Diego Division
Context
Cyberinfrastructure (CI)† †
• 100s of stakeholders (e.g., producers,
consumers, operators, etc.)
• Stakeholders opt in only when CI
satisfies their requirements
• CIs have long delivery times
Solution
Policy
• Injected at specific workflow location
• Decision expressed in Domain-
Specific Language (DSL1)
• Provides alternate workflow(s)
Results
Benefits
• Rapid requirement realization
(on live system)
• Enable stakeholders to articulate
requirements as policies
• Enable complex/compound policies
Future Work
• Policy authoring system2,3
• Verify completeness/correctness4
using CPN Tools5
• Maintain system consistency
• Secure policy deployment
This material is based upon work supported by the National Institutes of Health
Under Grant Nos 1U01CA130771-01 (Project PALMS: Kevin Patrick, PI) and U54 HL108460
f
† †Cyberinfrastructures (CI)
f
f
†PALMS References
Physical Activity Location Measurement System to understand where activity-related energy expenditure occurs in
humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides
framework for research and analysis, and has ultimate goal of discovering methods for engineering better health.
An Internet-based research computing environment that supports data acquisition, data storage, data management, data
integration, data mining, data visualization, and other computing and information processing services. Different
stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else
the integrity of the CI degrades.
1. M. Fowler. Domain-Specific Languages. Boston, MA: Addison-Wesley, Pearson Education, Inc. Sept 2010.
2. T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proceedings of the
5th International Conference on The Unified Modeling Language. pp426-441. Springer Verlag, 2002.
3. A. Bhattacharjee and R. Shyamasundar. Activity Diagrams: A Formal Framework to Model Business Processes and Code Generation.
Journal of Object Technology. Vol 8, No 1, Jan 2009.
4. J. Juerjens. Security Systems Development with UML. Springer-Verlag Berlin Heidelberg, 2003.
5. K. Jensen and L. Kristensen. Coloured Petri Nets: Modeling and Validation of Concurrent Systems. Berlin: Springer-Verlag. 2009.
6. M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. KrĂźger, and M. Menarini. Rich Services: The Integration Piece of the
SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul.
2007, pp. 176-183.
Sensor Data
Techniques
Service Oriented Architecture-
based execution & deployment
• Leverage standard patterns5:
strategy, messaging, routing, &
composite pattern
• Leverage role-based interaction,
choreography & interceptor
techniques
• High availability, reliable, scalable
Model-driven engineering
• Refinement follows Rich Service6
decomposition & logical/deployment
transformation
• Composition based on Systems-of-
Systems principles
PALMS† Case Study
Data Storage Calculations Visualization
Overall Requirements
Problem
More stakeholders 
requirements churn 
even longer delivery times 
unhappy stakeholders
∴ lower likelihood CI will satisfy
community requirements
Insight
Compose new workflows onto
existing workflows at runtime
• Access control, data stream filtering
• Feature addition/deletion
Conceptual

Weitere ähnliche Inhalte

Andere mochten auch

Concilium article sept 2015
Concilium article sept 2015Concilium article sept 2015
Concilium article sept 2015Nancy Nerone
 
Poster jsoe research expo 2011
Poster   jsoe research expo 2011Poster   jsoe research expo 2011
Poster jsoe research expo 2011bdemchak
 
EducaciĂłn en la fe cartel
EducaciĂłn en la fe cartelEducaciĂłn en la fe cartel
EducaciĂłn en la fe cartelFreddy Caal
 
KGEIGER_RESUME2015
KGEIGER_RESUME2015KGEIGER_RESUME2015
KGEIGER_RESUME2015Kelly Geiger
 
Pulse 29 sister cities 1
Pulse 29 sister cities 1Pulse 29 sister cities 1
Pulse 29 sister cities 1Tom Lloyd
 
KGEIGER_PROJECTHISTORY2015
KGEIGER_PROJECTHISTORY2015KGEIGER_PROJECTHISTORY2015
KGEIGER_PROJECTHISTORY2015Kelly Geiger
 
Healdsburg Innovation
Healdsburg Innovation Healdsburg Innovation
Healdsburg Innovation Laurie Wachter
 
Yekala
YekalaYekala
YekalaYekaLesly
 
30hands Presentation
30hands Presentation30hands Presentation
30hands PresentationMary Jo Madda
 
IENER QUINCHIA
IENER QUINCHIAIENER QUINCHIA
IENER QUINCHIAEsteban Villa
 

Andere mochten auch (14)

Concilium article sept 2015
Concilium article sept 2015Concilium article sept 2015
Concilium article sept 2015
 
Edward said
Edward saidEdward said
Edward said
 
Tax compliance
Tax complianceTax compliance
Tax compliance
 
Poster jsoe research expo 2011
Poster   jsoe research expo 2011Poster   jsoe research expo 2011
Poster jsoe research expo 2011
 
Foamboard Prescan X Bouwster
Foamboard Prescan X BouwsterFoamboard Prescan X Bouwster
Foamboard Prescan X Bouwster
 
EducaciĂłn en la fe cartel
EducaciĂłn en la fe cartelEducaciĂłn en la fe cartel
EducaciĂłn en la fe cartel
 
KGEIGER_RESUME2015
KGEIGER_RESUME2015KGEIGER_RESUME2015
KGEIGER_RESUME2015
 
Pwc global-gold-price-survey-results-2014-11-en
Pwc global-gold-price-survey-results-2014-11-enPwc global-gold-price-survey-results-2014-11-en
Pwc global-gold-price-survey-results-2014-11-en
 
Pulse 29 sister cities 1
Pulse 29 sister cities 1Pulse 29 sister cities 1
Pulse 29 sister cities 1
 
KGEIGER_PROJECTHISTORY2015
KGEIGER_PROJECTHISTORY2015KGEIGER_PROJECTHISTORY2015
KGEIGER_PROJECTHISTORY2015
 
Healdsburg Innovation
Healdsburg Innovation Healdsburg Innovation
Healdsburg Innovation
 
Yekala
YekalaYekala
Yekala
 
30hands Presentation
30hands Presentation30hands Presentation
30hands Presentation
 
IENER QUINCHIA
IENER QUINCHIAIENER QUINCHIA
IENER QUINCHIA
 

Ähnlich wie Poster jsoe research expo 2012

Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010bdemchak
 
TECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACHTECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACHcscpconf
 
Chapter 1
Chapter 1Chapter 1
Chapter 1Hassan Dar
 
Text Summarization and Conversion of Speech to Text
Text Summarization and Conversion of Speech to TextText Summarization and Conversion of Speech to Text
Text Summarization and Conversion of Speech to TextIRJET Journal
 
Identification & analysis of parameters for program quality improvement a ree...
Identification & analysis of parameters for program quality improvement a ree...Identification & analysis of parameters for program quality improvement a ree...
Identification & analysis of parameters for program quality improvement a ree...Alexander Decker
 
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...Baden Hughes
 
QuaP2P Kickoff Slides 2006
QuaP2P Kickoff Slides 2006QuaP2P Kickoff Slides 2006
QuaP2P Kickoff Slides 2006Kalman Graffi
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...ijseajournal
 
QUality Assessment of System Architectures and their Requirements (QUASAR)
QUality Assessment of System Architectures and their Requirements (QUASAR)QUality Assessment of System Architectures and their Requirements (QUASAR)
QUality Assessment of System Architectures and their Requirements (QUASAR)Donald Firesmith
 
SYS5160 a review of a GIS system
SYS5160 a review of a GIS system SYS5160 a review of a GIS system
SYS5160 a review of a GIS system Peter Timusk
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system modelsAbDul ThaYyal
 
Systems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsSystems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsijcsit
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionYasir Raza Khan
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionYasir Raza Khan
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMScscpconf
 
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance Checking
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance CheckingCIB W78 2015 - Semantic Rule-checking for Regulation Compliance Checking
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance CheckingPieter Pauwels
 
Methodology for the Development of Vocal User Interfaces
Methodology for the Development of Vocal User InterfacesMethodology for the Development of Vocal User Interfaces
Methodology for the Development of Vocal User InterfacesJean Vanderdonckt
 

Ähnlich wie Poster jsoe research expo 2012 (20)

Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010
 
TECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACHTECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACH
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Text Summarization and Conversion of Speech to Text
Text Summarization and Conversion of Speech to TextText Summarization and Conversion of Speech to Text
Text Summarization and Conversion of Speech to Text
 
Identification & analysis of parameters for program quality improvement a ree...
Identification & analysis of parameters for program quality improvement a ree...Identification & analysis of parameters for program quality improvement a ree...
Identification & analysis of parameters for program quality improvement a ree...
 
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
 
QuaP2P Kickoff Slides 2006
QuaP2P Kickoff Slides 2006QuaP2P Kickoff Slides 2006
QuaP2P Kickoff Slides 2006
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...
 
QUality Assessment of System Architectures and their Requirements (QUASAR)
QUality Assessment of System Architectures and their Requirements (QUASAR)QUality Assessment of System Architectures and their Requirements (QUASAR)
QUality Assessment of System Architectures and their Requirements (QUASAR)
 
SYS5160 a review of a GIS system
SYS5160 a review of a GIS system SYS5160 a review of a GIS system
SYS5160 a review of a GIS system
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
 
Systems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsSystems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature concepts
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd edition
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd edition
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance Checking
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance CheckingCIB W78 2015 - Semantic Rule-checking for Regulation Compliance Checking
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance Checking
 
SDLC
SDLCSDLC
SDLC
 
Sub1583
Sub1583Sub1583
Sub1583
 
81-T48
81-T4881-T48
81-T48
 
Methodology for the Development of Vocal User Interfaces
Methodology for the Development of Vocal User InterfacesMethodology for the Development of Vocal User Interfaces
Methodology for the Development of Vocal User Interfaces
 

Mehr von bdemchak

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysisbdemchak
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...bdemchak
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructurebdemchak
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2bdemchak
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introductionbdemchak
 
Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chatbdemchak
 
Ucsd tum workshop bd
Ucsd tum workshop bdUcsd tum workshop bd
Ucsd tum workshop bdbdemchak
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSbdemchak
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentationbdemchak
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAPbdemchak
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescuebdemchak
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentationbdemchak
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentationbdemchak
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration storybdemchak
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...bdemchak
 
Rich feeds for rescue, palms cyberinfrastructure integration stories
Rich feeds for rescue, palms cyberinfrastructure   integration storiesRich feeds for rescue, palms cyberinfrastructure   integration stories
Rich feeds for rescue, palms cyberinfrastructure integration storiesbdemchak
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualizationbdemchak
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojurebdemchak
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...bdemchak
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...bdemchak
 

Mehr von bdemchak (20)

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysis
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructure
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introduction
 
Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chat
 
Ucsd tum workshop bd
Ucsd tum workshop bdUcsd tum workshop bd
Ucsd tum workshop bd
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMS
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentation
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAP
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescue
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentation
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentation
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration story
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
Rich feeds for rescue, palms cyberinfrastructure integration stories
Rich feeds for rescue, palms cyberinfrastructure   integration storiesRich feeds for rescue, palms cyberinfrastructure   integration stories
Rich feeds for rescue, palms cyberinfrastructure integration stories
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualization
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojure
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...
 

KĂźrzlich hochgeladen

Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessEnvertis Software Solutions
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 

KĂźrzlich hochgeladen (20)

Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 

Poster jsoe research expo 2012

  • 1. Rich Service Model Policies Policy Evaluator Requestor Fulfiller Generic Workflow Requestor Fulfiller Alternate Fulfiller 1 2 1 4 2 3 2' 3' Policy Evaluator (injected at runtime) If User in Researchers then Fulfiller else AlternateFulfiller Policies Policy Evaluator Requestor Fulfiller Generic Workflow Requestor Fulfiller Alternate Fulfiller 1 3 1 2 5 4' 5'Policy Evaluator returns service to execute Router 2 4 36 4Router If User in Researchers then [Fulfiller] else [AlternateFulfiller] Policy-driven Development Just-In-Time Workflow Composition Barry Demchak (bdemchak@ucsd.edu) & Ingolf KrĂźger California Institute for Telecommunications and Information Technology, San Diego Division Context Cyberinfrastructure (CI)† † • 100s of stakeholders (e.g., producers, consumers, operators, etc.) • Stakeholders opt in only when CI satisfies their requirements • CIs have long delivery times Solution Policy • Injected at specific workflow location • Decision expressed in Domain- Specific Language (DSL1) • Provides alternate workflow(s) Results Benefits • Rapid requirement realization (on live system) • Enable stakeholders to articulate requirements as policies • Enable complex/compound policies Future Work • Policy authoring system2,3 • Verify completeness/correctness4 using CPN Tools5 • Maintain system consistency • Secure policy deployment This material is based upon work supported by the National Institutes of Health Under Grant Nos 1U01CA130771-01 (Project PALMS: Kevin Patrick, PI) and U54 HL108460 f † †Cyberinfrastructures (CI) f f †PALMS References Physical Activity Location Measurement System to understand where activity-related energy expenditure occurs in humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides framework for research and analysis, and has ultimate goal of discovering methods for engineering better health. An Internet-based research computing environment that supports data acquisition, data storage, data management, data integration, data mining, data visualization, and other computing and information processing services. Different stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else the integrity of the CI degrades. 1. M. Fowler. Domain-Specific Languages. Boston, MA: Addison-Wesley, Pearson Education, Inc. Sept 2010. 2. T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proceedings of the 5th International Conference on The Unified Modeling Language. pp426-441. Springer Verlag, 2002. 3. A. Bhattacharjee and R. Shyamasundar. Activity Diagrams: A Formal Framework to Model Business Processes and Code Generation. Journal of Object Technology. Vol 8, No 1, Jan 2009. 4. J. Juerjens. Security Systems Development with UML. Springer-Verlag Berlin Heidelberg, 2003. 5. K. Jensen and L. Kristensen. Coloured Petri Nets: Modeling and Validation of Concurrent Systems. Berlin: Springer-Verlag. 2009. 6. M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. KrĂźger, and M. Menarini. Rich Services: The Integration Piece of the SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul. 2007, pp. 176-183. Sensor Data Techniques Service Oriented Architecture- based execution & deployment • Leverage standard patterns5: strategy, messaging, routing, & composite pattern • Leverage role-based interaction, choreography & interceptor techniques • High availability, reliable, scalable Model-driven engineering • Refinement follows Rich Service6 decomposition & logical/deployment transformation • Composition based on Systems-of- Systems principles PALMS† Case Study Data Storage Calculations Visualization Overall Requirements Problem More stakeholders  requirements churn  even longer delivery times  unhappy stakeholders ∴ lower likelihood CI will satisfy community requirements Insight Compose new workflows onto existing workflows at runtime • Access control, data stream filtering • Feature addition/deletion Conceptual