SlideShare a Scribd company logo
1 of 30
PALMS:
A Modern Coevolution of
Community and Computing Using
Policy Driven Development
HICSS 2012
Maui, HI
January 5, 2012
Barry Demchak
1
Motivation
???
2
Study
Repository
Visualization
Repository
Calculation
Repository
Observation and Solution
PI
Study
Study
Study
PI
Study
Study
PI
Study
PALMS
StudyStudyStudy
Study
StudyStudy
PI PI
PI
Community
• Policy-driven access
control
– Subject data
– Study data
– Calculations
– Visualizations
• Secure
• HIPAA Compliance
• Customized Studies
• Collaboration
• Data Reuse
Browser
Excel,
Matlab…
Personal Activity Location
Measurement System
• Understanding where activity-
related energy expenditure
occurs in time and space
3
• Common Research Interests
– Geospatial activity data based on wearable devices
– Activity classification based on trips
– Engineering better health
• Common Problems
– Safe and secure data storage
– Trip and activity classification algorithms
– Transfer of analysis to visualization
– Funding
• The PALMS Strategy
– Build it and they will come?
Community Drivers
4
Roadmap
• Approach to PALMS Community development
• PALMS technical requirements
• Rationale for Policy Driven Design
• Mechanics of Policy Driven Design
• Example of policy injection and policies
• Feature injection
5
Emerging PALMS Community
• Engagement
– 20+ groups internationally (mostly non-NSF/NIH)
– Advisory Board and online surveys (SurveyMonkey)
– Early adopters
– Existing networks (GPSHRN, ALR, IPEN) – newsletters and co-grants
– 1st Annual International PALMS User Conference
• Lowering Barriers to Entry
– Introduction and instruction video
– User documentation
– IRB and grant language
– Scientific validity – validated algorithms
– Revenue model
– Preloading data & PALMSCom
• Incremental scaling
– Distributed models (calculation execution, data storage, server, authorship)
– File Sharing (concentric rings) & social networks
6
The Technical Requirement
• Technical Requirements
– Support research workflows
– Security and privacy
– High reliability and availability
– Scalability (bandwidth/storage/users)
– Auditability
– Provenance and curation
• Key Insights
– All stakeholders must have requirements met, or CI degrades
– Existing development models have long latencies
– Requirements are often lost in translation
– Success of CI depends on
– Accurate, timely, and continuous requirement elicitation
– Precise requirement formulation
– Low implementation latency
– Automatic requirement composition
7
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
– Services loosely coupled
– Late binding
– Scalability
– Testable
– Interoperable
– Incremental development
– Composition
– Services can be hierarchically decomposed
8
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
– Services loosely coupled
– Service interactions can be intercepted
– Services can be hierarchically decomposed
Producer Database
OK
StoreData(xxx)
Time
9
Access Control
Producer Database
Message Bus
StoreData(xxx)
OK
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
– Services loosely coupled
– Service interactions can be intercepted
– Services can be hierarchically decomposed
Event
Logger
Policy
Service/
Data
Connector
Community
Calculation
Repository
PALMS Service
Service/
Data
Connector
Device
Repository
Calculation
Repository
Study Repository
Observation
Repository
Subject
Repository
Failure Detection/
Mitigation
Result
Repository
Community
Device
Repository
Event
Logger
Policy
Failure Detection/
Mitigation
Browser User Interface
10
Study
Repository
Visualization
Engine
Calculation
Engine
PALMS
StudyStudyStudy
Study
StudyStudy
PI
RA
Enter
Subjects
Enter
Observations
Guest
Real Workflows
11
Study
Repository
Visualization
Engine
Calculation
Engine
PALMS
StudyStudyStudy
Study
StudyStudy
PI
RA
Guest
Policy
Policy
Admin
Policy in Action
Policy (def.): Permission
for someone to act on
something
12
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
• Workflows as service compositions
User
Interface
Device
Repository
GetList(userID)
DeviceID[]
Show Devices
Screen
Get
Device List
Show
Device List
UI UIPALMS
13
A Workflow and Policy Case Study
Filter by Role
User
Interface
Device
Repository
Policy: Reject
Role(userID)PI
GetList(userID)
DeviceID[]
Err: Reject
… or ...
{
Allow only PIs
Show Devices
Screen
Get
Device List
Show
Device List
UI UIPALMS
User
Interface
Device
Repository
Policy: Filter
Device Records
by Role(userID)
GetList(userID)
DeviceID[]
14
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
• Workflows as service compositions
• Policy injection
– Policy evaluation
– Domain Specific Language (DSLs)
User
Interface
Device
Repository
Policy
Engine
GetList(userID)
GetList(userID)
DeviceID[]
DeviceID[]'
Policy: Reject
Role(userID)PI
Err: RejectEvent
Logger
Policy
Service/
Data
Connector
Community
Calculation
Repository
PALMS Service
Failure Detection/
Mitigation
Community
Device
Repository
Browser User Interface
15
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
• Workflows as service compositions
• Policy injection
– Policy evaluation
– Domain Specific Language (DSLs)
if ($UserID = '/O=caBIG/CN=bdemchak')
then () (: execute normal flow :)
else return 'Err:Reject'
if (palms:subject-in-study-role('PI')
then () (: execute normal flow :)
else return 'Err:Reject'
DeviceListPolicy.templateReference = DeviceListTemplate
DeviceListPolicy.templateParameter.RoleList = PI
16
Policy Driven Development
• Goals
– Enable rapid customization
– Empower stakeholders to directly define behavior
• Service Oriented Architecture (Rich Services)
• Workflows as service compositions
• Policy injection
• Feature injection
– Policy System
– Auditing
– Provenance
Event
Logger
Policy
Service/
Data
Connector
Community
Calculation
Repository
PALMS Service
Failure Detection/
Mitigation
Community
Device
Repository
Browser User Interface
Policy
Engine
Policy
Repository
Policy UI
Event
Acquisition
Event
Repository
Audit UI
17
Success!
Event
Logger
Policy
Service/
Data
Connector
Community
Calculation
Repository
PALMS Service
Failure Detection/
Mitigation
Community
Device
Repository
Browser User Interface
18
Questions?
19
Service Orientation
Decomposition
Interception
Policy Injection Feature Composition
SPSS
ESRI
GPS Device
Accelerometer
Others
PALMS
Study StudyStudy
Study
Filtering Filtering Filtering
Scoring
Analyzing
Scoring Scoring
Analyzing Analyzing
External
Data
Subject
Data
Raw Data
Others
...
...
Google Maps Viewer Other Local Viewer
Data Flow (CI)
20
Rich Services
21
Messenger
Router/Interceptor
Policy
Service/Data
Connector
Messenger
Router/Interceptor
Failure
Manager
...
<<Rich Service>> S
Service/Data
Connector
...
<<Rich Service>> S.n
Service/Data
Connector }<<
Rich
Infrastructure
Services
>>
Encryption
Service/Data
Connector
Logging
Service/Data
Connector
Failure Manager
Service/Data
Connector
...
Service/Data
Connector
S.1
Service/Data
Connector
S.2
Service/Data
Connector
}<<
Rich
Application
Services
>>
S.n.2
Service/Data
Connector
S.n.m
Service/Data
Connector
}<<
Rich
Application
Services
>>
S.n.1
Service/Data
Connector
Service/Data
Connector
Logging
Service/Data
Connector
Encryption
Service/Data
Connector
Policy ...
Service/Data
Connector
Service/Data
Connector
<<
Rich
Infrastructure
Services
>>
}
From tightly to l o o s e l y coupled systems
Rich Service Blueprint
22
Event Logger
Access
Policies
PALMS Integration System
Integration
Adapter
Data
Repository
HIPAA
Policies
Service/
Data
Connector
Viewer
Viewer
Adapter
Consumer Systems
Service/
Data
ConnectorSensor
Adapter
Sensor
Producer Systems
Subject
Repository
Service/
Data
Connector
Authoring
Calculation
Repository
Calculation Systems
ExecutionPrototyping
Failure Detection/
Mitigation
Logical Architecture
23
Rich Services Virtual Network
Rich Services
RAS4
Services
Service S1
Roles
U1
U2
U3
U4
U5
Use Case Graph
Concerns
C1 C2 C3
C4
CC1
CC2CC3
Domain Model
R1 R2
R3 R4
R5 R6
R1 R2
msg
R3
CC1
CC2
Role Domain Model
R1 R2
R3 R4
R5 R6
CC1 CC2 CC3
Router/Interceptor
Messenger/Communicator
RAS1 RAS2
CC1 CC4 CC5
Router/Interceptor
Messenger/Communicator
RAS5 RAS6RAS3
S
/
D
S
/
D
RIS:
RIS:
ServiceElicitationRichServiceArchitecture
RAS7
System of Systems Topology
H1 H2
H3
H5
H6
H7
H8
H9
H4
RAS1 RAS2 RAS3
RAS5 RAS6 RAS7
Infrastructure Mapping
H1:RAS1 H2:RAS2
H3:CC1
H5:RAS2
H6:RAS5
H7:RAS7H8:RAS7
H9:RAS6
H4:RAS3
Optimization
Implementation
RAS1 RAS2
RAS3 RAS4
RAS5 RAS6
RAS7 CC1
CC2 CC3
CC4 CC5
Analysis
Synthesis
Analysis
Identification
Definition
Consolidation
Refinement
Hierarchic
composition
Refinement
Logical Model
SystemArchitecture
Definition
Logical Architecture Loop
Deployment Loop
Rich Service Development Process
24
Yesterday Today
Device A Device B Device C Subjects
Calculation 1
Result 1
• Calculations are complex
(includes tagging, hides
intermediate results)
• Results can’t be used in
calculations
Device A Device B Device C Subjects
Calculation 2
Result 3
Tagging
B
Tagging
C
Tagging
Subj
Tagging
A
Tagged
A
Tagged
B
Tagged
C
Tagged
Subj
Calculation 3
Result 2
• Finer grained calculations easier
to write and reuse
• Intermediate results can be
reused
• Results can be fed to calculations
Flexible Networks
25
Provenance
Device B Device C Subjects Calculation 1
Result 1
Today Tomorrow
Solution: Provenance
Tracking which calculations and
data contributed to a result
What went into Result1?
Device A Device B Device C Subjects
Calculation 2
Result 3
Tagging
B
Tagging
C
Tagging
Subj
Tagging
A
Tagged
A
Tagged
B
Tagged
C
Tagged
Subj
Calculation 3 Result 2
What went into Result3?
26
Spectrum of Sharing1
Trust Publish Interaction Quality Privacy Enablers
No one Nothing No one - - -
Friends &
Family
Subsets/
derivatives
Word of
mouth
Person to
person
Handshake
promise
None
Community ″ Conference
booths/
papers
Curation2 De-ident &
agreement
Auto de-ident,
Agreement
template3,4
Public ″ Repository/
registry
Taxonomies/
semantics
″ ″
1 C. Fennema-Notestine. Enabling Public Data Sharing: Encouraging Scientific Discovery and Education
2 Strong metadata, use common ontological framework, collection conditions & semantics, validated calculation &
visualization
3 Suggested IRB or HIPAA wording
4 Promise to not re-identify, use data at own risk, no quality guarantees, properly acknowledge data source
27
PALMSCom Mutual Support
UCSD PALMS
Support Team
User 1
User 2 User 3
User 4 User 5
28
PALMSCom Example
29
Deployment
Web Browser
(UI)
PALMS
Service
GWT RPC
Mule Messaging
Browser
Proxy (UI)
PALMS
Subservices
CXF Web Services
Mule Messaging
CXF Web Services
GWT RPC
PALMS Server VM
PC Browser PALMS Server Machine
JAVA (GWT) JAVA (Mule ESB)
30

More Related Content

Viewers also liked

Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chatbdemchak
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentationbdemchak
 
Introduction to es bs mule
Introduction to es bs   muleIntroduction to es bs   mule
Introduction to es bs mulebdemchak
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...bdemchak
 
Cytoscape ci chapter 1
Cytoscape ci chapter 1Cytoscape ci chapter 1
Cytoscape ci chapter 1bdemchak
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2bdemchak
 
Software safety in embedded systems &amp; software safety why, what, and how
Software safety in embedded systems &amp; software safety   why, what, and how Software safety in embedded systems &amp; software safety   why, what, and how
Software safety in embedded systems &amp; software safety why, what, and how bdemchak
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescuebdemchak
 
Uml introduction
Uml introductionUml introduction
Uml introductionbdemchak
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...bdemchak
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojurebdemchak
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualizationbdemchak
 
Introduction to soa composition
Introduction to soa compositionIntroduction to soa composition
Introduction to soa compositionbdemchak
 
Overview of policies for security and data sharing
Overview of policies for security and data sharingOverview of policies for security and data sharing
Overview of policies for security and data sharingbdemchak
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration storybdemchak
 
Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...bdemchak
 
Provinance in scientific workflows in e science
Provinance in scientific workflows in e scienceProvinance in scientific workflows in e science
Provinance in scientific workflows in e sciencebdemchak
 
Palm pilot case analysis for Harvard Summer School by André Brant, Adrés Olea...
Palm pilot case analysis for Harvard Summer School by André Brant, Adrés Olea...Palm pilot case analysis for Harvard Summer School by André Brant, Adrés Olea...
Palm pilot case analysis for Harvard Summer School by André Brant, Adrés Olea...Dr Ritesh Malik
 

Viewers also liked (19)

Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chat
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentation
 
Introduction to es bs mule
Introduction to es bs   muleIntroduction to es bs   mule
Introduction to es bs mule
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
Cytoscape ci chapter 1
Cytoscape ci chapter 1Cytoscape ci chapter 1
Cytoscape ci chapter 1
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2
 
Software safety in embedded systems &amp; software safety why, what, and how
Software safety in embedded systems &amp; software safety   why, what, and how Software safety in embedded systems &amp; software safety   why, what, and how
Software safety in embedded systems &amp; software safety why, what, and how
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescue
 
Uml introduction
Uml introductionUml introduction
Uml introduction
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojure
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualization
 
Introduction to soa composition
Introduction to soa compositionIntroduction to soa composition
Introduction to soa composition
 
Overview of policies for security and data sharing
Overview of policies for security and data sharingOverview of policies for security and data sharing
Overview of policies for security and data sharing
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration story
 
Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...Information assurance in a world of model driven architecture and service ori...
Information assurance in a world of model driven architecture and service ori...
 
Provinance in scientific workflows in e science
Provinance in scientific workflows in e scienceProvinance in scientific workflows in e science
Provinance in scientific workflows in e science
 
Session 11.ppt
Session 11.pptSession 11.ppt
Session 11.ppt
 
Palm pilot case analysis for Harvard Summer School by André Brant, Adrés Olea...
Palm pilot case analysis for Harvard Summer School by André Brant, Adrés Olea...Palm pilot case analysis for Harvard Summer School by André Brant, Adrés Olea...
Palm pilot case analysis for Harvard Summer School by André Brant, Adrés Olea...
 

Similar to PALMS Community Computing Policy Driven Development HICSS 2012

Jisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc RDM
 
SharePoint 2013 governance model
SharePoint 2013 governance modelSharePoint 2013 governance model
SharePoint 2013 governance modelYash Goley
 
Neo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Neo4j GraphTour Santa Monica 2019 - Amundsen PresentationNeo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Neo4j GraphTour Santa Monica 2019 - Amundsen PresentationTamikaTannis
 
Drive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event ProcessingDrive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event ProcessingPerficient, Inc.
 
Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Stephane Fellah
 
Geospatial Ontologies and GeoSPARQL Services
Geospatial Ontologies and GeoSPARQL ServicesGeospatial Ontologies and GeoSPARQL Services
Geospatial Ontologies and GeoSPARQL ServicesStephane Fellah
 
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...Capgemini
 
How Lyft Drives Data Discovery
How Lyft Drives Data DiscoveryHow Lyft Drives Data Discovery
How Lyft Drives Data DiscoveryNeo4j
 
Identity Management: Tools, processes & services
Identity Management: Tools, processes & servicesIdentity Management: Tools, processes & services
Identity Management: Tools, processes & servicesJISC Netskills
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...African Open Science Platform
 
Connected development data
Connected development dataConnected development data
Connected development dataRob Worthington
 
r.elativity Capabilities Summary
r.elativity Capabilities Summaryr.elativity Capabilities Summary
r.elativity Capabilities Summarybronzerocket
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachSoftServe
 
Assessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesAssessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesDATAVERSITY
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
The 5 Critical Pillars of Office 365 Readiness
The 5 Critical Pillars of Office 365 ReadinessThe 5 Critical Pillars of Office 365 Readiness
The 5 Critical Pillars of Office 365 ReadinessAdam Levithan
 
Paving the way to open and interoperable research data service workflows Prog...
Paving the way to open and interoperable research data service workflows Prog...Paving the way to open and interoperable research data service workflows Prog...
Paving the way to open and interoperable research data service workflows Prog...ResearchSpace
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Institut of Entrepreneurship & Management
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Institute of Information Systems (HES-SO)
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Geoffrey Fox
 

Similar to PALMS Community Computing Policy Driven Development HICSS 2012 (20)

Jisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring UpdateJisc Research Data Shared Service - Spring Update
Jisc Research Data Shared Service - Spring Update
 
SharePoint 2013 governance model
SharePoint 2013 governance modelSharePoint 2013 governance model
SharePoint 2013 governance model
 
Neo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Neo4j GraphTour Santa Monica 2019 - Amundsen PresentationNeo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Neo4j GraphTour Santa Monica 2019 - Amundsen Presentation
 
Drive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event ProcessingDrive Smarter Decisions with Big Data Using Complex Event Processing
Drive Smarter Decisions with Big Data Using Complex Event Processing
 
Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management Ontologies for Emergency & Disaster Management
Ontologies for Emergency & Disaster Management
 
Geospatial Ontologies and GeoSPARQL Services
Geospatial Ontologies and GeoSPARQL ServicesGeospatial Ontologies and GeoSPARQL Services
Geospatial Ontologies and GeoSPARQL Services
 
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
CWIN17 san francisco-thomas dornis-2017 - Data concierge-The Foundation of a ...
 
How Lyft Drives Data Discovery
How Lyft Drives Data DiscoveryHow Lyft Drives Data Discovery
How Lyft Drives Data Discovery
 
Identity Management: Tools, processes & services
Identity Management: Tools, processes & servicesIdentity Management: Tools, processes & services
Identity Management: Tools, processes & services
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...
 
Connected development data
Connected development dataConnected development data
Connected development data
 
r.elativity Capabilities Summary
r.elativity Capabilities Summaryr.elativity Capabilities Summary
r.elativity Capabilities Summary
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric Approach
 
Assessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesAssessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use Cases
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
The 5 Critical Pillars of Office 365 Readiness
The 5 Critical Pillars of Office 365 ReadinessThe 5 Critical Pillars of Office 365 Readiness
The 5 Critical Pillars of Office 365 Readiness
 
Paving the way to open and interoperable research data service workflows Prog...
Paving the way to open and interoperable research data service workflows Prog...Paving the way to open and interoperable research data service workflows Prog...
Paving the way to open and interoperable research data service workflows Prog...
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
 

More from bdemchak

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysisbdemchak
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...bdemchak
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructurebdemchak
 
No More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables InteroperabilityNo More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables Interoperabilitybdemchak
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introductionbdemchak
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSbdemchak
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentationbdemchak
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAPbdemchak
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentationbdemchak
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...bdemchak
 
Requirements vs design vs runtime
Requirements vs design vs runtimeRequirements vs design vs runtime
Requirements vs design vs runtimebdemchak
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecturebdemchak
 
Verification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesVerification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesbdemchak
 
Seda an architecture for well-conditioned scalable internet services
Seda   an architecture for well-conditioned scalable internet servicesSeda   an architecture for well-conditioned scalable internet services
Seda an architecture for well-conditioned scalable internet servicesbdemchak
 

More from bdemchak (15)

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysis
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructure
 
No More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables InteroperabilityNo More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables Interoperability
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introduction
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMS
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentation
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAP
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentation
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...
 
Requirements vs design vs runtime
Requirements vs design vs runtimeRequirements vs design vs runtime
Requirements vs design vs runtime
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
Verification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policiesVerification and change impact analysis of access-control policies
Verification and change impact analysis of access-control policies
 
Seda an architecture for well-conditioned scalable internet services
Seda   an architecture for well-conditioned scalable internet servicesSeda   an architecture for well-conditioned scalable internet services
Seda an architecture for well-conditioned scalable internet services
 

Recently uploaded

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Recently uploaded (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

PALMS Community Computing Policy Driven Development HICSS 2012

  • 1. PALMS: A Modern Coevolution of Community and Computing Using Policy Driven Development HICSS 2012 Maui, HI January 5, 2012 Barry Demchak 1
  • 3. Study Repository Visualization Repository Calculation Repository Observation and Solution PI Study Study Study PI Study Study PI Study PALMS StudyStudyStudy Study StudyStudy PI PI PI Community • Policy-driven access control – Subject data – Study data – Calculations – Visualizations • Secure • HIPAA Compliance • Customized Studies • Collaboration • Data Reuse Browser Excel, Matlab… Personal Activity Location Measurement System • Understanding where activity- related energy expenditure occurs in time and space 3
  • 4. • Common Research Interests – Geospatial activity data based on wearable devices – Activity classification based on trips – Engineering better health • Common Problems – Safe and secure data storage – Trip and activity classification algorithms – Transfer of analysis to visualization – Funding • The PALMS Strategy – Build it and they will come? Community Drivers 4
  • 5. Roadmap • Approach to PALMS Community development • PALMS technical requirements • Rationale for Policy Driven Design • Mechanics of Policy Driven Design • Example of policy injection and policies • Feature injection 5
  • 6. Emerging PALMS Community • Engagement – 20+ groups internationally (mostly non-NSF/NIH) – Advisory Board and online surveys (SurveyMonkey) – Early adopters – Existing networks (GPSHRN, ALR, IPEN) – newsletters and co-grants – 1st Annual International PALMS User Conference • Lowering Barriers to Entry – Introduction and instruction video – User documentation – IRB and grant language – Scientific validity – validated algorithms – Revenue model – Preloading data & PALMSCom • Incremental scaling – Distributed models (calculation execution, data storage, server, authorship) – File Sharing (concentric rings) & social networks 6
  • 7. The Technical Requirement • Technical Requirements – Support research workflows – Security and privacy – High reliability and availability – Scalability (bandwidth/storage/users) – Auditability – Provenance and curation • Key Insights – All stakeholders must have requirements met, or CI degrades – Existing development models have long latencies – Requirements are often lost in translation – Success of CI depends on – Accurate, timely, and continuous requirement elicitation – Precise requirement formulation – Low implementation latency – Automatic requirement composition 7
  • 8. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) – Services loosely coupled – Late binding – Scalability – Testable – Interoperable – Incremental development – Composition – Services can be hierarchically decomposed 8
  • 9. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) – Services loosely coupled – Service interactions can be intercepted – Services can be hierarchically decomposed Producer Database OK StoreData(xxx) Time 9 Access Control Producer Database Message Bus StoreData(xxx) OK
  • 10. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) – Services loosely coupled – Service interactions can be intercepted – Services can be hierarchically decomposed Event Logger Policy Service/ Data Connector Community Calculation Repository PALMS Service Service/ Data Connector Device Repository Calculation Repository Study Repository Observation Repository Subject Repository Failure Detection/ Mitigation Result Repository Community Device Repository Event Logger Policy Failure Detection/ Mitigation Browser User Interface 10
  • 13. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) • Workflows as service compositions User Interface Device Repository GetList(userID) DeviceID[] Show Devices Screen Get Device List Show Device List UI UIPALMS 13
  • 14. A Workflow and Policy Case Study Filter by Role User Interface Device Repository Policy: Reject Role(userID)PI GetList(userID) DeviceID[] Err: Reject … or ... { Allow only PIs Show Devices Screen Get Device List Show Device List UI UIPALMS User Interface Device Repository Policy: Filter Device Records by Role(userID) GetList(userID) DeviceID[] 14
  • 15. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) • Workflows as service compositions • Policy injection – Policy evaluation – Domain Specific Language (DSLs) User Interface Device Repository Policy Engine GetList(userID) GetList(userID) DeviceID[] DeviceID[]' Policy: Reject Role(userID)PI Err: RejectEvent Logger Policy Service/ Data Connector Community Calculation Repository PALMS Service Failure Detection/ Mitigation Community Device Repository Browser User Interface 15
  • 16. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) • Workflows as service compositions • Policy injection – Policy evaluation – Domain Specific Language (DSLs) if ($UserID = '/O=caBIG/CN=bdemchak') then () (: execute normal flow :) else return 'Err:Reject' if (palms:subject-in-study-role('PI') then () (: execute normal flow :) else return 'Err:Reject' DeviceListPolicy.templateReference = DeviceListTemplate DeviceListPolicy.templateParameter.RoleList = PI 16
  • 17. Policy Driven Development • Goals – Enable rapid customization – Empower stakeholders to directly define behavior • Service Oriented Architecture (Rich Services) • Workflows as service compositions • Policy injection • Feature injection – Policy System – Auditing – Provenance Event Logger Policy Service/ Data Connector Community Calculation Repository PALMS Service Failure Detection/ Mitigation Community Device Repository Browser User Interface Policy Engine Policy Repository Policy UI Event Acquisition Event Repository Audit UI 17
  • 20. SPSS ESRI GPS Device Accelerometer Others PALMS Study StudyStudy Study Filtering Filtering Filtering Scoring Analyzing Scoring Scoring Analyzing Analyzing External Data Subject Data Raw Data Others ... ... Google Maps Viewer Other Local Viewer Data Flow (CI) 20
  • 22. Messenger Router/Interceptor Policy Service/Data Connector Messenger Router/Interceptor Failure Manager ... <<Rich Service>> S Service/Data Connector ... <<Rich Service>> S.n Service/Data Connector }<< Rich Infrastructure Services >> Encryption Service/Data Connector Logging Service/Data Connector Failure Manager Service/Data Connector ... Service/Data Connector S.1 Service/Data Connector S.2 Service/Data Connector }<< Rich Application Services >> S.n.2 Service/Data Connector S.n.m Service/Data Connector }<< Rich Application Services >> S.n.1 Service/Data Connector Service/Data Connector Logging Service/Data Connector Encryption Service/Data Connector Policy ... Service/Data Connector Service/Data Connector << Rich Infrastructure Services >> } From tightly to l o o s e l y coupled systems Rich Service Blueprint 22
  • 23. Event Logger Access Policies PALMS Integration System Integration Adapter Data Repository HIPAA Policies Service/ Data Connector Viewer Viewer Adapter Consumer Systems Service/ Data ConnectorSensor Adapter Sensor Producer Systems Subject Repository Service/ Data Connector Authoring Calculation Repository Calculation Systems ExecutionPrototyping Failure Detection/ Mitigation Logical Architecture 23
  • 24. Rich Services Virtual Network Rich Services RAS4 Services Service S1 Roles U1 U2 U3 U4 U5 Use Case Graph Concerns C1 C2 C3 C4 CC1 CC2CC3 Domain Model R1 R2 R3 R4 R5 R6 R1 R2 msg R3 CC1 CC2 Role Domain Model R1 R2 R3 R4 R5 R6 CC1 CC2 CC3 Router/Interceptor Messenger/Communicator RAS1 RAS2 CC1 CC4 CC5 Router/Interceptor Messenger/Communicator RAS5 RAS6RAS3 S / D S / D RIS: RIS: ServiceElicitationRichServiceArchitecture RAS7 System of Systems Topology H1 H2 H3 H5 H6 H7 H8 H9 H4 RAS1 RAS2 RAS3 RAS5 RAS6 RAS7 Infrastructure Mapping H1:RAS1 H2:RAS2 H3:CC1 H5:RAS2 H6:RAS5 H7:RAS7H8:RAS7 H9:RAS6 H4:RAS3 Optimization Implementation RAS1 RAS2 RAS3 RAS4 RAS5 RAS6 RAS7 CC1 CC2 CC3 CC4 CC5 Analysis Synthesis Analysis Identification Definition Consolidation Refinement Hierarchic composition Refinement Logical Model SystemArchitecture Definition Logical Architecture Loop Deployment Loop Rich Service Development Process 24
  • 25. Yesterday Today Device A Device B Device C Subjects Calculation 1 Result 1 • Calculations are complex (includes tagging, hides intermediate results) • Results can’t be used in calculations Device A Device B Device C Subjects Calculation 2 Result 3 Tagging B Tagging C Tagging Subj Tagging A Tagged A Tagged B Tagged C Tagged Subj Calculation 3 Result 2 • Finer grained calculations easier to write and reuse • Intermediate results can be reused • Results can be fed to calculations Flexible Networks 25
  • 26. Provenance Device B Device C Subjects Calculation 1 Result 1 Today Tomorrow Solution: Provenance Tracking which calculations and data contributed to a result What went into Result1? Device A Device B Device C Subjects Calculation 2 Result 3 Tagging B Tagging C Tagging Subj Tagging A Tagged A Tagged B Tagged C Tagged Subj Calculation 3 Result 2 What went into Result3? 26
  • 27. Spectrum of Sharing1 Trust Publish Interaction Quality Privacy Enablers No one Nothing No one - - - Friends & Family Subsets/ derivatives Word of mouth Person to person Handshake promise None Community ″ Conference booths/ papers Curation2 De-ident & agreement Auto de-ident, Agreement template3,4 Public ″ Repository/ registry Taxonomies/ semantics ″ ″ 1 C. Fennema-Notestine. Enabling Public Data Sharing: Encouraging Scientific Discovery and Education 2 Strong metadata, use common ontological framework, collection conditions & semantics, validated calculation & visualization 3 Suggested IRB or HIPAA wording 4 Promise to not re-identify, use data at own risk, no quality guarantees, properly acknowledge data source 27
  • 28. PALMSCom Mutual Support UCSD PALMS Support Team User 1 User 2 User 3 User 4 User 5 28
  • 30. Deployment Web Browser (UI) PALMS Service GWT RPC Mule Messaging Browser Proxy (UI) PALMS Subservices CXF Web Services Mule Messaging CXF Web Services GWT RPC PALMS Server VM PC Browser PALMS Server Machine JAVA (GWT) JAVA (Mule ESB) 30