collaborative technologies and enterprise middleware
play

Collaborative Technologies and Enterprise Middleware: A View of the - PowerPoint PPT Presentation

Collaborative Technologies and Enterprise Middleware: A View of the Next Few Years A Day in the Life of Jean Blue OOPS! After the break, we will have Session 2D: Middleware Authentication (instead of having Session 2C twice). Chair:


  1. Collaborative Technologies and Enterprise Middleware: A View of the Next Few Years A Day in the Life of Jean Blue

  2. OOPS! After the break, we will have Session 2D: Middleware – Authentication (instead of having Session 2C twice). Chair: Michael Gettes, Duke University, USA 2d1: Shibboleth Interoperability with the Athens Access Management System Lyn Norris, EduServ, United Kingdom 2d2: U.S. Federal eAuthentication and Higher Education Peter Alterman, Federal PKI Steering Committee, USA 2d3: Efforts to Establish Electronic Identities for Swedish Universities Torbjörn Wiberg, Umeå University, Sweden

  3. Agenda � Collaboration Technologies � Enterprise Middleware � A Day in the Life of Jean Blue, biologist •A morning of research •An afternoon of education •A night of personal life � What might go wrong •If we fail •If we succeed 6/23/2003 3

  4. Collaborative Technologies � Communication • Email, Desktop video, Audio on appliances � Computation • Grids, Peer-to-peer, Smart Dust � Coordination • Scheduling, calendaring � Commerce • Credential exchange in B2B and B2C 6/23/2003 4

  5. Enterprises � Organizations that, as part of your belonging, help you manage your information and access in an electronic world � We may use three or so enterprises… • Work – your university or your corporation • Home – a service provider offering consumer services • Personal – a second service provider for extra privacy and security 6/23/2003 5

  6. Enterprise Middleware � Identity Services – converting real identities to electronic identities � Authentication – verifying an electronic identity � Directories – containing the attributes of identity and systems � Authorization – deciding what actions an identity is permitted to do 6/23/2003 6

  7. Pieces of an enterprise middleware 6/23/2003 7

  8. More pieces of an enterprise architecture Policy Policy Enforcement Enforcement Point Point PEP PEP Attribute Requestor Policy Decision Engine The Legacy Policy Business Enforcement Point Applications PEP ????? Enterprise Attributes, Groups, Registries, etc. 6/23/2003 8

  9. Enterprise middleware and applications 6/23/2003 9

  10. Federations of Enterprises � An interrealm approach – enterprises are realms, and they mutually join into federations to conduct business. � For the consumer marketplace, users subscribe to commercial service offerings to interact with business federations; enterprises that might offer consumer services include desktop OS’s (Microsoft), ISP’s (AOL), Telecoms (Nokia, telco’s), consumer product vendors (Ford, United Airlines) and banks (Chase). 6/23/2003 10

  11. Emergent Federations � SecuritiesHub – 8 large banks to share research reports among customers � Swiss R&E Federation – national universities using Shibboleth � InCommon – universities � Club Roadkill – experimental testbed � Liberty Alliance, Federated .NET, Shibboleth, PAPI are among the tech drivers… 6/23/2003 11

  12. Clusters of Federations � Federations of similar interests or communities. � Share metadata, attribute standards � May have dissimilar trust and policy issues � Clusters of federations may resemble groups of NRENs, perhaps with different participants 6/23/2003 12

  13. Welcome Jean Blue � A biologist at the Center for Medical Paramecium � Teaches graduate classes at the University � Treats paramecium at a clinic � Single, available… 6/23/2003 13

  14. Jean Blue 6/23/2003 14

  15. A Morning of Research � Checking on their Grid computation � Updating the collaboration site � Videoconferencing with peers � Looking at the research journals � Refereeing a paper 6/23/2003 15

  16. Collaborative research tools � Signed email � Middleware-enabled videoconferencing � Convertible credentials • Local becomes global � Authenticated and authorized use of resources • Local and virtual permissions • Privacy as required – as a reader – as a referee 6/23/2003 16 – as an editor

  17. Updating the collaborative web site � Local login to enterprise � Establish rights on the collaborative site � Upload and edit; leave an audit trail � Revisit web site as an anonymous user � Revisit web site as a graduate student 6/23/2003 17

  18. Middleware-enabled video � Automatic resource discovery � Authentication/announcement to target � Authorization to use bandwidth � Across H.323, SIP, AG, VRVS � Privacy 6/23/2003 18

  19. An afternoon of teaching and administration 6/23/2003 19

  20. An afternoon of education � Adding research results to class � Booking travel to Terena 2008 � Instant messaging � Virtual office hours � Evaluating a resume � Managing the new lab assistants � Shared calendaring 6/23/2003 20

  21. Collaborative tools in education � Signed email � Middleware-enables videoconferencing � Roles � Privacy enabled educational services � Enterprise-enabled federated P2P � Local associations � Digital rights management 6/23/2003 21

  22. Enterprise, federated P2P � Authentication of clients to enterprise � Authorization � Efficient resource discovery � File sharing with accountability 6/23/2003 22

  23. Managing the lab assistants � Setting their roles into the appropriate directories � Automating feeds from systems of record � Signing transactions into the systems of records � Setting calendar permissions 6/23/2003 23

  24. An evening of life 6/23/2003 24

  25. An evening of life � Booking a restaurant � Voting in local surveys � Single and available 6/23/2003 25

  26. Collaborative tools in life � Signed email � Chat sessions � Attribute management services � Hip routers 6/23/2003 26

  27. Single, available � Chat with privacy protections and authentication � Voting in local surveys � Progressive disclosure services 6/23/2003 27

  28. Key concepts � Role-based access controls � Layering for scaling – federations, enterprises and virtual organizations � Privacy – from whom � Presence � Diagnostics � Trust 6/23/2003 28

  29. What could go wrong? …how we could fail � A single vendor wins � A marketplace does not get established � Users don’t care about privacy or security � Federations prove costly and difficult � Inter-federation issues do not get solved � International issues prove intractable 6/23/2003 29

  30. What could go wrong …if we succeed � Erosion of privacy • Difficulty Exposure Rubber squeeze toys � Lost time in the management of collaboration • Modalities Complexities Global issues � Identity tampering � Effects on the quality of life 6/23/2003 30

  31. Issues and turtles � The Bertrand Russell turtle •will the layers get to be too much •will the complexity be manageable by users � The Edward Oppenheimer turtle •do the necessary damage carefully 6/23/2003 31

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend