SlideShare a Scribd company logo
1 of 24
Download to read offline
PoSecCo: modelling services
  for the Future Internet
          Antonio Lioy
      Politecnico di Torino
        <lioy@polito.it>

   Amsterdam - July 4-5, 2011
Posecco scenario: Future Internet seen
from a Service Provider (SP)
           security reqs                                                           security reqs from
         from customers                      SP-customers                          laws and regulations




                                                                                             security reqs
             Provider
             Service



  sec reqs                  Service       Service        Service         service             from suppliers
from mgmt

                    application                     application
                                                                                   application
                                       application         application


                                  DB                                                  DB
                                                            Supplier




                                                                                                 Supplier
  SP-staff              system                  system                   system
                           network
                                                                                                            2
PoSecCo view: services in FI




                               3
What to model?

 companies run business processes/services
   the interesting ones are the ones implemented using IT resources
 SP main goal? reducing costs
   infrastructure
      re-use existing services
      avoid re-implementing a service for each customer
          … if the policy allows it
   implementation and maintenance
      integrated policy refinement using the “policy chain”
   … with a higher level of security
 PoSecCo aims at supporting SPs with models and tools
                                                                      4
Main requirements …
 business services (BS) can be implemented by a number of
 different IT services (i.e., abstract service profiles)
 several customers can buy the same BS and every customer may
 use one or more instances of an IT service
 IT service = components + choreography
 IT services interact with other IT services or use other IT services
 as sub-components
 every IT service may have different instantiations
    using different physical or virtual resources (running services) and sub-
    services
    running services can execute several components of the same IT service
    running services can execute several components from different IT
    services
 SP can outsource (sub-)services, applications, or HW (hosting
 providers)
                                                                                5
A quick look at Posecco meta-models

        Services                        Policies
                                      Business policy
    Business meta-model                meta-model

                                IT policy (access control,
    IT service meta-model      confidentiality, filtering, …)

                                configurations for policy
  Infrastructure meta-model    enabled security elements


                                                            6
A quick look at Posecco meta-models

                                  current service
                                   meta-model
        Services

    Business meta-model


    IT service meta-model


  Infrastructure meta-model

                                                    7
Service modelling layers
IT layer
Infrastructure




                                 8
Some more details: the concepts

                                              business        business          business
             institutions
                                               service        process         information

                service        hosting
 customers
               providers      providers


                     IT Resource     IT service      IT service
   Links                                                                          Data
                        model        interface         model


                                    IT resource
                    IT resource                      IT service
                                     interface


  channel                                                              node
                    IT resource      interface

                                                            physical          virtual
                                                             node              node
                                                                                         9
Business layer: business services




 business services (BS) are structured in processes
     terminology from TUe and not in contrast with BPMN
     BS are not necessarily the ones implemented using IT technologies
     implemented by a number of different IT services (i.e., abstract service
     profiles)
                                                                                10
 business processes (BP) may be structured in hierarchies and may depend on other
 BPs
Business layer: institutions




 BP customers
     several customers can buy the same BS and every customer may use one or
     more instances of an IT service
 service providers (SP) and their relationships: SPs buying services from other SPs
 hosting providers                                                                    11
Business layer: business info




 very abstract concepts to be further instantiated and adapted
 roles
     not the same as the standard “access control role”, described in the IT policy
     meta-model
     more abstract, associated to company-dependent functions                         12
IT layer: the service models




 IT service model: abstract definition corresponding to the interface it exposes
 IT services interact with other IT services or use them as sub-components
 IT service models are described by
     components: IT resources (the Applications)
     choreography: a link connects a resource to an interface
 IT resource is an abstract definition of the component/application
     web server, FTP server, Invoice application, EDI, …
 every IT service may have different implementations
     using different physical or virtual resources (running services) and sub-services13
IT layer: data




 first class entities in the access control meta-model
 need to be customized in the model
      according to customer and SP needs




                                                         14
Catalog: what an SP sells




 used to enumerate all the service models sold by a SP
   Crossgate requirement: modern way of managing It services
      instead of defining a general service model with configurable parameters
      (e.g., communication protocols, web server types) good for academia
   e.g., if the SP sells two versions of the “invoicing BS”, one allowing
   access to the front end using SFTP and one HTTPS, the catalog will
   include two instances of ITServiceProfile


                                                                                 15
Infrastructure layer: running services




  every IT service model may be implemented
      using different physical or virtual resources (running services) and sub-services
  to re-use components and save time and money:…
      running services can execute several components of the same IT service
      running services can execute several components from different IT services
      e.g., web servers running front ends, DBs                                        16
Infrastructure layer: the landscape




 virtual and physical nodes connected through interfaces
      located somewhere (for dependability and risk analysis purposes)
 full topology information may be described
      according to the required level of details
          PoSecCo uses full topology view for the configuration generation
          e.g., to configure all the firewalls and VPN terminators in the landscape   17
The PoSecCo ontology(ies)

                                      business meta-model
                                      business ontology (?)


                                      IT layer meta-model
                                      IT layer ontology


                                      infrastructure meta-model
                                      infrastructure ontology



                extend concepts in meta-models with a
                semantically richer tool
                use the “inclusion” and “equivalence”
                features to link the separated ontologies
                                                                  18
Tools and formats

 meta-models as standard UML class diagrams
 from meta-models to models
   constrain the model derivation process to avoid integration issues
   XML representation in the PoSecCo repository
   meta-models
   models
   instances
   …ongoing effort
   ontologies represented in OWL




                                                                    19
PoSecCo and EffectPlus

 PoSecCo will provide:
   meta-models for services in a SP-oriented scenario
   layered architecture: business, IT and infrastructure
   full details in a document that will come soon
 inputs:
   test your service description with our model and provide us the missing
   requirements
      e.g., more info on service virtualization
 collaboration:
   a service modelling working group?
 common output:
   unified meta-model for Future Internet
   … agreed and adopted by all the EffectPlus partners (at least)
                                                                         20
THANK YOU!
Disclaimer

EU Disclaimer
PoSecCo project (project no. 257129) is partially supported/co-funded by the European
Community/ European Union/EU under the Information and Communication Technologies (ICT)
theme of the 7th Framework Programme for R&D (FP7).

This document does not represent the opinion of the European Community, and the European
Community is not responsible for any use that might be made of its content.

PoSecCo Disclaimer
The information in this document is provided "as is", and no guarantee or warranty is given that
the information is fit for any particular purpose. The above referenced consortium members shall
have no liability for damages of any kind including without limitation direct, special, indirect, or
consequential damages that may result from the use of these materials subject to any liability
which is mandatory due to applicable law.




                                                                                                   22
23
24

More Related Content

What's hot

Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Mohammed Omar
 
20091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 520091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 5Arian Zwegers
 
API Management for Enterprise Mobile Access a How-to Guide
API Management for Enterprise Mobile Access  a How-to GuideAPI Management for Enterprise Mobile Access  a How-to Guide
API Management for Enterprise Mobile Access a How-to GuideCA API Management
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyijcseit
 
Bloombase Spitfire SOA Security Server Brochure
Bloombase Spitfire SOA Security Server BrochureBloombase Spitfire SOA Security Server Brochure
Bloombase Spitfire SOA Security Server BrochureBloombase
 
Management Architecture for Dynamic Federated Identity Management
Management Architecture for Dynamic Federated Identity Management Management Architecture for Dynamic Federated Identity Management
Management Architecture for Dynamic Federated Identity Management csandit
 
Distributed systems and middleware
Distributed systems and middlewareDistributed systems and middleware
Distributed systems and middlewareClaudio Fiandrino
 
Company profile
Company profileCompany profile
Company profileLundegaard
 
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Jennifer Stevenson
 
Spagic3 Presentation En
Spagic3 Presentation EnSpagic3 Presentation En
Spagic3 Presentation EnSpagoWorld
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardConference Papers
 
Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001jucaab
 
Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyCisco Canada
 
Driving Competitive Advantage through Customer-Focused Solution Selling
Driving Competitive Advantage through Customer-Focused Solution SellingDriving Competitive Advantage through Customer-Focused Solution Selling
Driving Competitive Advantage through Customer-Focused Solution SellingFlexera
 
Supply chain presentation 11 2006
Supply chain presentation 11 2006Supply chain presentation 11 2006
Supply chain presentation 11 2006Girard Brewer
 
Security, Governance & Integration in a Cloud Connected World
Security, Governance & Integration in a Cloud Connected WorldSecurity, Governance & Integration in a Cloud Connected World
Security, Governance & Integration in a Cloud Connected WorldCA API Management
 
Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001jucaab
 

What's hot (18)

Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...
 
20091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 520091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 5
 
API Management for Enterprise Mobile Access a How-to Guide
API Management for Enterprise Mobile Access  a How-to GuideAPI Management for Enterprise Mobile Access  a How-to Guide
API Management for Enterprise Mobile Access a How-to Guide
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancy
 
Bloombase Spitfire SOA Security Server Brochure
Bloombase Spitfire SOA Security Server BrochureBloombase Spitfire SOA Security Server Brochure
Bloombase Spitfire SOA Security Server Brochure
 
Management Architecture for Dynamic Federated Identity Management
Management Architecture for Dynamic Federated Identity Management Management Architecture for Dynamic Federated Identity Management
Management Architecture for Dynamic Federated Identity Management
 
Distributed systems and middleware
Distributed systems and middlewareDistributed systems and middleware
Distributed systems and middleware
 
Company profile
Company profileCompany profile
Company profile
 
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
 
Spagic3 Presentation En
Spagic3 Presentation EnSpagic3 Presentation En
Spagic3 Presentation En
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001
 
Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case Study
 
Driving Competitive Advantage through Customer-Focused Solution Selling
Driving Competitive Advantage through Customer-Focused Solution SellingDriving Competitive Advantage through Customer-Focused Solution Selling
Driving Competitive Advantage through Customer-Focused Solution Selling
 
Supply chain presentation 11 2006
Supply chain presentation 11 2006Supply chain presentation 11 2006
Supply chain presentation 11 2006
 
Security, Governance & Integration in a Cloud Connected World
Security, Governance & Integration in a Cloud Connected WorldSecurity, Governance & Integration in a Cloud Connected World
Security, Governance & Integration in a Cloud Connected World
 
Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001
 
542 546
542 546542 546
542 546
 

Viewers also liked

Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meetingfcleary
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704fcleary
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meetingfcleary
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectivesfcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meetingfcleary
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meetingfcleary
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meetingfcleary
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1fcleary
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides amsfcleary
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meetingfcleary
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisifcleary
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meetingfcleary
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1fcleary
 

Viewers also liked (19)

Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
 
Syssec
SyssecSyssec
Syssec
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Tdl
TdlTdl
Tdl
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
Nessos
NessosNessos
Nessos
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 

Similar to Posecco cluster meeting

Cloud Computing Why, What, How
Cloud Computing   Why, What, HowCloud Computing   Why, What, How
Cloud Computing Why, What, HowKennisportal
 
20090213 Friday Food Croslocis
20090213 Friday Food Croslocis20090213 Friday Food Croslocis
20090213 Friday Food Croslocisimec.archive
 
20090213 Friday Food croslocis
20090213 Friday Food croslocis20090213 Friday Food croslocis
20090213 Friday Food croslocisimec.archive
 
Compositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML ServicesCompositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML ServicesDebmalya Biswas
 
Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Sandro Pereira
 
7irene Application Reference Model - Presented at OT2004
7irene Application Reference Model - Presented at OT20047irene Application Reference Model - Presented at OT2004
7irene Application Reference Model - Presented at OT2004ghodgkinson
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfMansiMehta96928
 
Impact 2011 2667 - Developing effective services for use in critical business...
Impact 2011 2667 - Developing effective services for use in critical business...Impact 2011 2667 - Developing effective services for use in critical business...
Impact 2011 2667 - Developing effective services for use in critical business...Brian Petrini
 
Soa Overview
Soa OverviewSoa Overview
Soa OverviewTerry Cho
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology poonam kumawat
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Developmentijbuiiir1
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Developmentijwtiir
 
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Ike Alisson
 
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?Brian Elvesæter
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 

Similar to Posecco cluster meeting (20)

Cloud Computing Why, What, How
Cloud Computing   Why, What, HowCloud Computing   Why, What, How
Cloud Computing Why, What, How
 
20090213 Friday Food Croslocis
20090213 Friday Food Croslocis20090213 Friday Food Croslocis
20090213 Friday Food Croslocis
 
20090213 Friday Food croslocis
20090213 Friday Food croslocis20090213 Friday Food croslocis
20090213 Friday Food croslocis
 
Compositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML ServicesCompositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML Services
 
Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm
 
7irene Application Reference Model - Presented at OT2004
7irene Application Reference Model - Presented at OT20047irene Application Reference Model - Presented at OT2004
7irene Application Reference Model - Presented at OT2004
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
Impact 2011 2667 - Developing effective services for use in critical business...
Impact 2011 2667 - Developing effective services for use in critical business...Impact 2011 2667 - Developing effective services for use in critical business...
Impact 2011 2667 - Developing effective services for use in critical business...
 
Soa Overview
Soa OverviewSoa Overview
Soa Overview
 
Unit 4 -IOT1.pptx
Unit 4 -IOT1.pptxUnit 4 -IOT1.pptx
Unit 4 -IOT1.pptx
 
soa ppt v7.ppt
soa ppt v7.pptsoa ppt v7.ppt
soa ppt v7.ppt
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Development
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Development
 
Middleware
MiddlewareMiddleware
Middleware
 
Middleware1
Middleware1Middleware1
Middleware1
 
Api enablement-mainframe
Api enablement-mainframeApi enablement-mainframe
Api enablement-mainframe
 
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
 
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
Web services og SOA – hvordan ser vi for oss bruk i fremtiden?
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 

More from fcleary

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report fcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meetingfcleary
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus wsfcleary
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingfcleary
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meetingfcleary
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fclearyfcleary
 

More from fcleary (7)

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meeting
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meeting
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fcleary
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Posecco cluster meeting

  • 1. PoSecCo: modelling services for the Future Internet Antonio Lioy Politecnico di Torino <lioy@polito.it> Amsterdam - July 4-5, 2011
  • 2. Posecco scenario: Future Internet seen from a Service Provider (SP) security reqs security reqs from from customers SP-customers laws and regulations security reqs Provider Service sec reqs Service Service Service service from suppliers from mgmt application application application application application DB DB Supplier Supplier SP-staff system system system network 2
  • 4. What to model? companies run business processes/services the interesting ones are the ones implemented using IT resources SP main goal? reducing costs infrastructure re-use existing services avoid re-implementing a service for each customer … if the policy allows it implementation and maintenance integrated policy refinement using the “policy chain” … with a higher level of security PoSecCo aims at supporting SPs with models and tools 4
  • 5. Main requirements … business services (BS) can be implemented by a number of different IT services (i.e., abstract service profiles) several customers can buy the same BS and every customer may use one or more instances of an IT service IT service = components + choreography IT services interact with other IT services or use other IT services as sub-components every IT service may have different instantiations using different physical or virtual resources (running services) and sub- services running services can execute several components of the same IT service running services can execute several components from different IT services SP can outsource (sub-)services, applications, or HW (hosting providers) 5
  • 6. A quick look at Posecco meta-models Services Policies Business policy Business meta-model meta-model IT policy (access control, IT service meta-model confidentiality, filtering, …) configurations for policy Infrastructure meta-model enabled security elements 6
  • 7. A quick look at Posecco meta-models current service meta-model Services Business meta-model IT service meta-model Infrastructure meta-model 7
  • 8. Service modelling layers IT layer Infrastructure 8
  • 9. Some more details: the concepts business business business institutions service process information service hosting customers providers providers IT Resource IT service IT service Links Data model interface model IT resource IT resource IT service interface channel node IT resource interface physical virtual node node 9
  • 10. Business layer: business services business services (BS) are structured in processes terminology from TUe and not in contrast with BPMN BS are not necessarily the ones implemented using IT technologies implemented by a number of different IT services (i.e., abstract service profiles) 10 business processes (BP) may be structured in hierarchies and may depend on other BPs
  • 11. Business layer: institutions BP customers several customers can buy the same BS and every customer may use one or more instances of an IT service service providers (SP) and their relationships: SPs buying services from other SPs hosting providers 11
  • 12. Business layer: business info very abstract concepts to be further instantiated and adapted roles not the same as the standard “access control role”, described in the IT policy meta-model more abstract, associated to company-dependent functions 12
  • 13. IT layer: the service models IT service model: abstract definition corresponding to the interface it exposes IT services interact with other IT services or use them as sub-components IT service models are described by components: IT resources (the Applications) choreography: a link connects a resource to an interface IT resource is an abstract definition of the component/application web server, FTP server, Invoice application, EDI, … every IT service may have different implementations using different physical or virtual resources (running services) and sub-services13
  • 14. IT layer: data first class entities in the access control meta-model need to be customized in the model according to customer and SP needs 14
  • 15. Catalog: what an SP sells used to enumerate all the service models sold by a SP Crossgate requirement: modern way of managing It services instead of defining a general service model with configurable parameters (e.g., communication protocols, web server types) good for academia e.g., if the SP sells two versions of the “invoicing BS”, one allowing access to the front end using SFTP and one HTTPS, the catalog will include two instances of ITServiceProfile 15
  • 16. Infrastructure layer: running services every IT service model may be implemented using different physical or virtual resources (running services) and sub-services to re-use components and save time and money:… running services can execute several components of the same IT service running services can execute several components from different IT services e.g., web servers running front ends, DBs 16
  • 17. Infrastructure layer: the landscape virtual and physical nodes connected through interfaces located somewhere (for dependability and risk analysis purposes) full topology information may be described according to the required level of details PoSecCo uses full topology view for the configuration generation e.g., to configure all the firewalls and VPN terminators in the landscape 17
  • 18. The PoSecCo ontology(ies) business meta-model business ontology (?) IT layer meta-model IT layer ontology infrastructure meta-model infrastructure ontology extend concepts in meta-models with a semantically richer tool use the “inclusion” and “equivalence” features to link the separated ontologies 18
  • 19. Tools and formats meta-models as standard UML class diagrams from meta-models to models constrain the model derivation process to avoid integration issues XML representation in the PoSecCo repository meta-models models instances …ongoing effort ontologies represented in OWL 19
  • 20. PoSecCo and EffectPlus PoSecCo will provide: meta-models for services in a SP-oriented scenario layered architecture: business, IT and infrastructure full details in a document that will come soon inputs: test your service description with our model and provide us the missing requirements e.g., more info on service virtualization collaboration: a service modelling working group? common output: unified meta-model for Future Internet … agreed and adopted by all the EffectPlus partners (at least) 20
  • 22. Disclaimer EU Disclaimer PoSecCo project (project no. 257129) is partially supported/co-funded by the European Community/ European Union/EU under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D (FP7). This document does not represent the opinion of the European Community, and the European Community is not responsible for any use that might be made of its content. PoSecCo Disclaimer The information in this document is provided "as is", and no guarantee or warranty is given that the information is fit for any particular purpose. The above referenced consortium members shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials subject to any liability which is mandatory due to applicable law. 22
  • 23. 23
  • 24. 24