SlideShare a Scribd company logo
1 of 1
Rich Service Model
Policies
Policy
Evaluator
Requestor Fulfiller
Generic Workflow
Requestor
Fulfiller
Alternate
Fulfiller
1
2
1
4
2 3
2'
3'
Policy Evaluator
(injected at
runtime) If User in Researchers
then Fulfiller
else AlternateFulfiller
Policies
Policy
Evaluator
Requestor Fulfiller
Generic Workflow
Requestor
Fulfiller
Alternate
Fulfiller
1
3
1
2
5
4'
5'Policy Evaluator
returns service to
execute
Router
2
4 36
4Router
If User in Researchers
then [Fulfiller]
else [AlternateFulfiller]
Policy-driven Development
Just-In-Time Workflow Composition
Barry Demchak (bdemchak@ucsd.edu) & Ingolf Krüger
California Institute for Telecommunications and Information Technology, San Diego Division
Context
Cyberinfrastructure (CI)† †
• 100s of stakeholders (e.g., producers,
consumers, operators, etc.)
• Stakeholders opt in only when CI
satisfies their requirements
• CIs have long delivery times
Solution
Policy
• Injected at specific workflow location
• Decision expressed in Domain-
Specific Language (DSL1)
• Provides alternate workflow(s)
Results
Benefits
• Rapid requirement realization
(on live system)
• Enable stakeholders to articulate
requirements as policies
• Enable complex/compound policies
Future Work
• Policy authoring system2,3
• Verify completeness/correctness4
using CPN Tools5
• Maintain system consistency
• Secure policy deployment
This material is based upon work supported by the National Institutes of Health
Under Grant Nos 1U01CA130771-01 (Project PALMS: Kevin Patrick, PI) and U54 HL108460
f
† †Cyberinfrastructures (CI)
f
f
†PALMS References
Physical Activity Location Measurement System to understand where activity-related energy expenditure occurs in
humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides
framework for research and analysis, and has ultimate goal of discovering methods for engineering better health.
An Internet-based research computing environment that supports data acquisition, data storage, data management, data
integration, data mining, data visualization, and other computing and information processing services. Different
stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else
the integrity of the CI degrades.
1. M. Fowler. Domain-Specific Languages. Boston, MA: Addison-Wesley, Pearson Education, Inc. Sept 2010.
2. T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proceedings of the
5th International Conference on The Unified Modeling Language. pp426-441. Springer Verlag, 2002.
3. A. Bhattacharjee and R. Shyamasundar. Activity Diagrams: A Formal Framework to Model Business Processes and Code Generation.
Journal of Object Technology. Vol 8, No 1, Jan 2009.
4. J. Juerjens. Security Systems Development with UML. Springer-Verlag Berlin Heidelberg, 2003.
5. K. Jensen and L. Kristensen. Coloured Petri Nets: Modeling and Validation of Concurrent Systems. Berlin: Springer-Verlag. 2009.
6. M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. Krüger, and M. Menarini. Rich Services: The Integration Piece of the
SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul.
2007, pp. 176-183.
Sensor Data
Techniques
Service Oriented Architecture-
based execution & deployment
• Leverage standard patterns5:
strategy, messaging, routing, &
composite pattern
• Leverage role-based interaction,
choreography & interceptor
techniques
• High availability, reliable, scalable
Model-driven engineering
• Refinement follows Rich Service6
decomposition & logical/deployment
transformation
• Composition based on Systems-of-
Systems principles
PALMS† Case Study
Data Storage Calculations Visualization
Overall Requirements
Problem
More stakeholders 
requirements churn 
even longer delivery times 
unhappy stakeholders
∴ lower likelihood CI will satisfy
community requirements
Insight
Compose new workflows onto
existing workflows at runtime
• Access control, data stream filtering
• Feature addition/deletion
Conceptual

More Related Content

Viewers also liked

Concilium article sept 2015
Concilium article sept 2015Concilium article sept 2015
Concilium article sept 2015
Nancy Nerone
 
KGEIGER_RESUME2015
KGEIGER_RESUME2015KGEIGER_RESUME2015
KGEIGER_RESUME2015
Kelly Geiger
 
KGEIGER_PROJECTHISTORY2015
KGEIGER_PROJECTHISTORY2015KGEIGER_PROJECTHISTORY2015
KGEIGER_PROJECTHISTORY2015
Kelly Geiger
 

Viewers also liked (14)

Concilium article sept 2015
Concilium article sept 2015Concilium article sept 2015
Concilium article sept 2015
 
Edward said
Edward saidEdward said
Edward said
 
Tax compliance
Tax complianceTax compliance
Tax compliance
 
Poster jsoe research expo 2011
Poster   jsoe research expo 2011Poster   jsoe research expo 2011
Poster jsoe research expo 2011
 
Foamboard Prescan X Bouwster
Foamboard Prescan X BouwsterFoamboard Prescan X Bouwster
Foamboard Prescan X Bouwster
 
Educación en la fe cartel
Educación en la fe cartelEducación en la fe cartel
Educación en la fe cartel
 
KGEIGER_RESUME2015
KGEIGER_RESUME2015KGEIGER_RESUME2015
KGEIGER_RESUME2015
 
Pwc global-gold-price-survey-results-2014-11-en
Pwc global-gold-price-survey-results-2014-11-enPwc global-gold-price-survey-results-2014-11-en
Pwc global-gold-price-survey-results-2014-11-en
 
Pulse 29 sister cities 1
Pulse 29 sister cities 1Pulse 29 sister cities 1
Pulse 29 sister cities 1
 
KGEIGER_PROJECTHISTORY2015
KGEIGER_PROJECTHISTORY2015KGEIGER_PROJECTHISTORY2015
KGEIGER_PROJECTHISTORY2015
 
Healdsburg Innovation
Healdsburg Innovation Healdsburg Innovation
Healdsburg Innovation
 
Yekala
YekalaYekala
Yekala
 
30hands Presentation
30hands Presentation30hands Presentation
30hands Presentation
 
IENER QUINCHIA
IENER QUINCHIAIENER QUINCHIA
IENER QUINCHIA
 

Similar to Poster jsoe research expo 2012

QuaP2P Kickoff Slides 2006
QuaP2P Kickoff Slides 2006QuaP2P Kickoff Slides 2006
QuaP2P Kickoff Slides 2006
Kalman Graffi
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
AbDul ThaYyal
 
Systems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsSystems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature concepts
ijcsit
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd edition
Yasir Raza Khan
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd edition
Yasir Raza Khan
 

Similar to Poster jsoe research expo 2012 (20)

Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010
 
TECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACHTECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACH
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Text Summarization and Conversion of Speech to Text
Text Summarization and Conversion of Speech to TextText Summarization and Conversion of Speech to Text
Text Summarization and Conversion of Speech to Text
 
Identification & analysis of parameters for program quality improvement a ree...
Identification & analysis of parameters for program quality improvement a ree...Identification & analysis of parameters for program quality improvement a ree...
Identification & analysis of parameters for program quality improvement a ree...
 
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
 
QuaP2P Kickoff Slides 2006
QuaP2P Kickoff Slides 2006QuaP2P Kickoff Slides 2006
QuaP2P Kickoff Slides 2006
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...
 
QUality Assessment of System Architectures and their Requirements (QUASAR)
QUality Assessment of System Architectures and their Requirements (QUASAR)QUality Assessment of System Architectures and their Requirements (QUASAR)
QUality Assessment of System Architectures and their Requirements (QUASAR)
 
SYS5160 a review of a GIS system
SYS5160 a review of a GIS system SYS5160 a review of a GIS system
SYS5160 a review of a GIS system
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
 
Systems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsSystems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature concepts
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd edition
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd edition
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance Checking
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance CheckingCIB W78 2015 - Semantic Rule-checking for Regulation Compliance Checking
CIB W78 2015 - Semantic Rule-checking for Regulation Compliance Checking
 
SDLC
SDLCSDLC
SDLC
 
Sub1583
Sub1583Sub1583
Sub1583
 
81-T48
81-T4881-T48
81-T48
 
Methodology for the Development of Vocal User Interfaces
Methodology for the Development of Vocal User InterfacesMethodology for the Development of Vocal User Interfaces
Methodology for the Development of Vocal User Interfaces
 

More from bdemchak

The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
bdemchak
 

More from bdemchak (20)

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysis
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructure
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introduction
 
Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chat
 
Ucsd tum workshop bd
Ucsd tum workshop bdUcsd tum workshop bd
Ucsd tum workshop bd
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMS
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentation
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAP
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescue
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentation
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentation
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration story
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
Rich feeds for rescue, palms cyberinfrastructure integration stories
Rich feeds for rescue, palms cyberinfrastructure   integration storiesRich feeds for rescue, palms cyberinfrastructure   integration stories
Rich feeds for rescue, palms cyberinfrastructure integration stories
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualization
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojure
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...
 
Requirements engineering from system goals to uml models to software specif...
Requirements engineering   from system goals to uml models to software specif...Requirements engineering   from system goals to uml models to software specif...
Requirements engineering from system goals to uml models to software specif...
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Recently uploaded (20)

Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

Poster jsoe research expo 2012

  • 1. Rich Service Model Policies Policy Evaluator Requestor Fulfiller Generic Workflow Requestor Fulfiller Alternate Fulfiller 1 2 1 4 2 3 2' 3' Policy Evaluator (injected at runtime) If User in Researchers then Fulfiller else AlternateFulfiller Policies Policy Evaluator Requestor Fulfiller Generic Workflow Requestor Fulfiller Alternate Fulfiller 1 3 1 2 5 4' 5'Policy Evaluator returns service to execute Router 2 4 36 4Router If User in Researchers then [Fulfiller] else [AlternateFulfiller] Policy-driven Development Just-In-Time Workflow Composition Barry Demchak (bdemchak@ucsd.edu) & Ingolf Krüger California Institute for Telecommunications and Information Technology, San Diego Division Context Cyberinfrastructure (CI)† † • 100s of stakeholders (e.g., producers, consumers, operators, etc.) • Stakeholders opt in only when CI satisfies their requirements • CIs have long delivery times Solution Policy • Injected at specific workflow location • Decision expressed in Domain- Specific Language (DSL1) • Provides alternate workflow(s) Results Benefits • Rapid requirement realization (on live system) • Enable stakeholders to articulate requirements as policies • Enable complex/compound policies Future Work • Policy authoring system2,3 • Verify completeness/correctness4 using CPN Tools5 • Maintain system consistency • Secure policy deployment This material is based upon work supported by the National Institutes of Health Under Grant Nos 1U01CA130771-01 (Project PALMS: Kevin Patrick, PI) and U54 HL108460 f † †Cyberinfrastructures (CI) f f †PALMS References Physical Activity Location Measurement System to understand where activity-related energy expenditure occurs in humans as a function of time and space. Harvests data from wearable devices on small and large scales, provides framework for research and analysis, and has ultimate goal of discovering methods for engineering better health. An Internet-based research computing environment that supports data acquisition, data storage, data management, data integration, data mining, data visualization, and other computing and information processing services. Different stakeholders produce, consume, manage, and govern a CI, and their requirements must be simultaneously met or else the integrity of the CI degrades. 1. M. Fowler. Domain-Specific Languages. Boston, MA: Addison-Wesley, Pearson Education, Inc. Sept 2010. 2. T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proceedings of the 5th International Conference on The Unified Modeling Language. pp426-441. Springer Verlag, 2002. 3. A. Bhattacharjee and R. Shyamasundar. Activity Diagrams: A Formal Framework to Model Business Processes and Code Generation. Journal of Object Technology. Vol 8, No 1, Jan 2009. 4. J. Juerjens. Security Systems Development with UML. Springer-Verlag Berlin Heidelberg, 2003. 5. K. Jensen and L. Kristensen. Coloured Petri Nets: Modeling and Validation of Concurrent Systems. Berlin: Springer-Verlag. 2009. 6. M. Arrott, B. Demchak, V. Ermagan, C. Farcas, E. Farcas, I. H. Krüger, and M. Menarini. Rich Services: The Integration Piece of the SOA Puzzle. In Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, Utah, USA. IEEE, Jul. 2007, pp. 176-183. Sensor Data Techniques Service Oriented Architecture- based execution & deployment • Leverage standard patterns5: strategy, messaging, routing, & composite pattern • Leverage role-based interaction, choreography & interceptor techniques • High availability, reliable, scalable Model-driven engineering • Refinement follows Rich Service6 decomposition & logical/deployment transformation • Composition based on Systems-of- Systems principles PALMS† Case Study Data Storage Calculations Visualization Overall Requirements Problem More stakeholders  requirements churn  even longer delivery times  unhappy stakeholders ∴ lower likelihood CI will satisfy community requirements Insight Compose new workflows onto existing workflows at runtime • Access control, data stream filtering • Feature addition/deletion Conceptual