Collaborative Technologies and Enterprise Middleware: A View of the - - PowerPoint PPT Presentation

collaborative technologies and enterprise middleware
SMART_READER_LITE
LIVE PREVIEW

Collaborative Technologies and Enterprise Middleware: A View of the - - PowerPoint PPT Presentation

Collaborative Technologies and Enterprise Middleware: A View of the Next Few Years A Day in the Life of Jean Blue OOPS! After the break, we will have Session 2D: Middleware Authentication (instead of having Session 2C twice). Chair:


slide-1
SLIDE 1

Collaborative Technologies and Enterprise Middleware:

A View of the Next Few Years

A Day in the Life of Jean Blue

slide-2
SLIDE 2

OOPS! After the break, we will have Session 2D: Middleware – Authentication

(instead of having Session 2C twice). Chair: Michael Gettes, Duke University, USA 2d1: Shibboleth Interoperability with the Athens Access Management System Lyn Norris, EduServ, United Kingdom 2d2: U.S. Federal eAuthentication and Higher Education Peter Alterman, Federal PKI Steering Committee, USA 2d3: Efforts to Establish Electronic Identities for Swedish Universities Torbjörn Wiberg, Umeå University, Sweden

slide-3
SLIDE 3

6/23/2003 3

Agenda

Collaboration Technologies Enterprise Middleware A Day in the Life of Jean Blue, biologist

  • A morning of research
  • An afternoon of education
  • A night of personal life

What might go wrong

  • If we fail
  • If we succeed
slide-4
SLIDE 4

6/23/2003 4

Collaborative Technologies

Communication

  • Email, Desktop video, Audio on appliances

Computation

  • Grids, Peer-to-peer, Smart Dust

Coordination

  • Scheduling, calendaring

Commerce

  • Credential exchange in B2B and B2C
slide-5
SLIDE 5

6/23/2003 5

Enterprises

Organizations that, as part of your belonging, help you manage your information and access in an electronic world We may use three or so enterprises…

  • Work – your university or your corporation
  • Home – a service provider offering consumer

services

  • Personal – a second service provider for extra

privacy and security

slide-6
SLIDE 6

6/23/2003 6

Enterprise Middleware

Identity Services – converting real identities to electronic identities Authentication – verifying an electronic identity Directories – containing the attributes of identity and systems Authorization – deciding what actions an identity is permitted to do

slide-7
SLIDE 7

6/23/2003 7

Pieces of an enterprise middleware

slide-8
SLIDE 8

6/23/2003 8

More pieces of an enterprise architecture

Attribute Requestor Policy Decision Engine

Policy Enforcement Point PEP

Enterprise Attributes, Groups, Registries, etc. The Legacy Business Applications

Policy Enforcement Point PEP Policy Enforcement Point PEP

?????

slide-9
SLIDE 9

6/23/2003 9

Enterprise middleware and applications

slide-10
SLIDE 10

6/23/2003 10

Federations of Enterprises

An interrealm approach – enterprises are realms, and they mutually join into federations to conduct business. For the consumer marketplace, users subscribe to commercial service offerings to interact with business federations; enterprises that might

  • ffer consumer services include desktop OS’s

(Microsoft), ISP’s (AOL), Telecoms (Nokia, telco’s), consumer product vendors (Ford, United Airlines) and banks (Chase).

slide-11
SLIDE 11

6/23/2003 11

Emergent Federations

SecuritiesHub – 8 large banks to share research reports among customers Swiss R&E Federation – national universities using Shibboleth InCommon – universities Club Roadkill – experimental testbed Liberty Alliance, Federated .NET, Shibboleth, PAPI are among the tech drivers…

slide-12
SLIDE 12

6/23/2003 12

Clusters of Federations

Federations of similar interests or communities. Share metadata, attribute standards May have dissimilar trust and policy issues Clusters of federations may resemble groups of NRENs, perhaps with different participants

slide-13
SLIDE 13

6/23/2003 13

Welcome Jean Blue

A biologist at the Center for Medical Paramecium Teaches graduate classes at the University Treats paramecium at a clinic Single, available…

slide-14
SLIDE 14

6/23/2003 14

Jean Blue

slide-15
SLIDE 15

6/23/2003 15

A Morning of Research

Checking on their Grid computation Updating the collaboration site Videoconferencing with peers Looking at the research journals Refereeing a paper

slide-16
SLIDE 16

6/23/2003 16

Collaborative research tools

Signed email Middleware-enabled videoconferencing Convertible credentials

  • Local becomes global

Authenticated and authorized use of resources

  • Local and virtual permissions
  • Privacy as required

– as a reader – as a referee – as an editor

slide-17
SLIDE 17

6/23/2003 17

Updating the collaborative web site Local login to enterprise Establish rights on the collaborative site Upload and edit; leave an audit trail Revisit web site as an anonymous user Revisit web site as a graduate student

slide-18
SLIDE 18

6/23/2003 18

Middleware-enabled video

Automatic resource discovery Authentication/announcement to target Authorization to use bandwidth Across H.323, SIP, AG, VRVS Privacy

slide-19
SLIDE 19

6/23/2003 19

An afternoon of teaching and administration

slide-20
SLIDE 20

6/23/2003 20

An afternoon of education

Adding research results to class Booking travel to Terena 2008 Instant messaging Virtual office hours Evaluating a resume Managing the new lab assistants Shared calendaring

slide-21
SLIDE 21

6/23/2003 21

Collaborative tools in education

Signed email Middleware-enables videoconferencing Roles Privacy enabled educational services Enterprise-enabled federated P2P Local associations Digital rights management

slide-22
SLIDE 22

6/23/2003 22

Enterprise, federated P2P

Authentication of clients to enterprise Authorization Efficient resource discovery File sharing with accountability

slide-23
SLIDE 23

6/23/2003 23

Managing the lab assistants

Setting their roles into the appropriate directories Automating feeds from systems of record Signing transactions into the systems of records Setting calendar permissions

slide-24
SLIDE 24

6/23/2003 24

An evening of life

slide-25
SLIDE 25

6/23/2003 25

An evening of life

Booking a restaurant Voting in local surveys Single and available

slide-26
SLIDE 26

6/23/2003 26

Collaborative tools in life

Signed email Chat sessions Attribute management services Hip routers

slide-27
SLIDE 27

6/23/2003 27

Single, available

Chat with privacy protections and authentication Voting in local surveys Progressive disclosure services

slide-28
SLIDE 28

6/23/2003 28

Key concepts

Role-based access controls Layering for scaling – federations, enterprises and virtual organizations Privacy – from whom Presence Diagnostics Trust

slide-29
SLIDE 29

6/23/2003 29

What could go wrong? …how we could fail A single vendor wins A marketplace does not get established Users don’t care about privacy or security Federations prove costly and difficult Inter-federation issues do not get solved International issues prove intractable

slide-30
SLIDE 30

6/23/2003 30

What could go wrong …if we succeed Erosion of privacy

  • Difficulty Exposure Rubber squeeze toys

Lost time in the management of collaboration

  • Modalities Complexities Global issues

Identity tampering Effects on the quality of life

slide-31
SLIDE 31

6/23/2003 31

Issues and turtles

The Bertrand Russell turtle

  • will the layers get to be too much
  • will the complexity be manageable by users

The Edward Oppenheimer turtle

  • do the necessary damage carefully