Service Interoperability
|
|
- Garry Kelly
- 8 years ago
- Views:
Transcription
1 Service Interoperability Multi-Modal Interoperability Concept (M ) Version 12/05/2013 Work Package 1.3 Responsible Partner MPDL DARIAH-DE Aufbau von Forschungsinfrastrukturen für die e-humanities This research and development project is / was funded by the German Federal Ministry of Education and Research (BMBF), fund number 01UG1110A to M, and managed by the Project Management Agency of the German Aerospace Center (Deutsches Zentrum für Luft- und Raumfahrt, PT-DLR).
2 Project: DARIAH-DE: Aufbau von Forschungsinfrastrukturen für die e-humanities BMBF Fund number: 01UG1110A to M Duration: March 2011 till February 2014 Document status: First version Dissemination level: DARIAH-DE-internal Authors: Ye Cao, MPDL Revisions: Date Author Comment 02/18/2013 Ye Cao Outline 03/27/2013 Ye Cao Draft 01/05/2013 Ye Cao Reversion 06/05/2013 Stefan Schmunk Comments 07/05/2013 Peter Gietz / Stefan E. Funk Reversion and Comments 12/05/2013 Ye Cao Reversion according to feedback 2
3 Table of Contents Service Interoperability... 1 Multi-Modal Interoperability Concept (M )... 1 DARIAH-DE... 1 Summary... 4 Purpose and Audience Problem Definition DARIAH Technological Architecture Multi-Modal Concept... 4 Level1 Documented... 5 Level2 Interoperable... 5 Level3 Certified... 5 Exception Core Infrastructure services Interoperability... 6 DARIAH Authorization and Authentication (AA) Service... 6 DARIAH Persistent Identifiers (PID) service... 8 DARIAH Storage API Related Issues Roadmap Bibliography
4 Summary This document introduces the interoperability concept for DARIAH technical services. It starts with setting scope of the topic. The main part lies on the multi-modal Interoperability model concept and best practices. The closing chapter give interoperability guide with DARIAH core infrastructure services. Purpose and Audience The proposed interoperability model can be applied to facilitate interoperability between the technical services created by independent stakeholders. This document has been written for DARIAH partners and DARIAH community to give recommendation so that how services could be interoperable with DARIAH infrastructure. 1. Problem Definition Interoperability is a very broad topic and it includes many aspects, e.g., the use of protocols and machine interfaces for accessing data, interoperability of data and metadata formats, adoption of open data licenses, and the use of machine-readable license formats [1]. Technical interoperability is complements of data interoperability [2]. It is said interoperability touches different levels of exchange. The most basic of these is the technical or system level [3]. The term service refers to a set of related software functionalities that can be accessed via application programming interface (API). A tool covers one specific scholarly activity, e.g. XML editor and it requires user interaction. The service interoperability discussed here includes both tools and services. 2. DARIAH Technological Architecture The technological architecture of DARIAH is service oriented architecture (SOA) [4]. The big advantage of SOA architecture is that users can implement their own services as modules that can be used to expand the available services. This approach will ensure that new developers will be able to plug their own tools into the DARIAH architecture or one can combine these services by building higher level services on top of existing ones Multi-Modal Concept The DARIAH technical report [5] defines 3 levels of service Interoperability: Documented, Interoperable and Certified. Services in DARIAH need to be at least documented, should be interoperable and can finally be fully DARIAH-certified. Each compliance level is a step further into the DARIAH ecosystem, with more responsibilities but also more opportunities to benefit from [5]. 4
5 Level1 Documented Exhaustive documentation is available to employ and adapt the component; ideally its source code is openly available. However, standards-based interfaces may be missing and any interaction with other components may need to be hard-coded into the software. Moreover, documentation and transparency of research services may be required for good scholarly practice, and they may hence be the key to trust. Level2 Interoperable The service is well-documented, and it offers standards-based technical interfaces to interact with other components in the DARIAH ecosystem. Interoperable services are capable of interacting with DARIAH core services including DARIAH Authentication and Authorization Infrastructure (AAI) and persistent identifiers (PID) services. Core services are essential for enabling interoperability across the heterogeneous data sources and decentralised services in the DARIAH ecosystem. Best Practices Applying standard web services interfaces, i.e., SOAP and REST-based services. Applying open standards,.e.g., OAI-PMH, RSS to expose reusable services. Promotion of applications based on DARIAH services for several use cases. Dedicated education and outreach activities from AP2 are expected. Specific technical paradigm, e.g., an Eclipse Rich Client with graphical user interfaces or a Virtual research environment (VRE), should be at least interoperable with DARIAH core services and involved service environment. Level3 Certified At the highest integration level, DARIAH aims to certify services based on existing best practices and relevant international standards. The organisational context of the component ensures the maintenance of the software and potentially migration paths to successors. For hosted services, the host institution ensures its availability, responsible management of any user-specific data, and other aspects usually discussed in service level agreements. Best Practices DARIAH service lifecycle [7] practise DARIAH service quality Assurance procedure. A certified service means it will pass the usability and value check by a team of scientific and technological mentors, so it can be hosted by DARIAH permanently. 5
6 Figure 1 DARIAH Service Life Cycle [7] state diagram shows how a new service could be integrated into the DARIAH infrastructure. Exception Individual components have three integration levels. However there are different channels for technical interoperability, not all services in the DARIAH ecosystem must be capable of interacting with each other Core Infrastructure services Interoperability The Core Infrastructure services are those that are essential to the running of the infrastructure and upon which other service are built and rely. So Interoperability with these services needs to be considered. DARIAH Authorization and Authentication (AA) Service Currently DARIAH deploys its AA service based on two standards: SAML and LDAP. It supports both Web Browser Single Sign-on (SSO) and Enhanced Client or Proxy (ECP) user cases. 6
7 Figure 2 Web Browser VS ECP client user cases [11] For Service providers (SP): SP are free to implement its service in SSO or ECP way. DARIAH Plans to adopt OAuth2 standard to facility SP, so developers only need to support one API only. For specific research project who wants to use DARIAH services, one coordinating facility will be assigned and at least two project administrators, i.e., a contact person and a representative are required according to DARIAH AAI role model. For the complete DARIAH AAI concept, please read [11] 7
8 Figure 3 DARIAH AAI Role Model [11] DARIAH Persistent Identifiers (PID) service The PID resolution and PID management is not built up by DARIAH, but DARIAH relies on the PID-Service of the European Persistent Identifier Consortium (EPIC). The PID development within DARIAH is coordinated with EPIC. EPIC is Handle based identifier system. Its focus is the registration of data in an early state of the scientific process, where lots of data is generated and has to become referable to collaborate with other scientific groups or communities [10]. The Digital Object Identifier (DOI) is widely used by the publishing industry for the persistent identification of journal articles. If a later registration with a DOI is wanted for some reason, the PIDs can be transferred because the identifier systems use the same underlying handle software. 8
9 Figure 3 Different PID is needed in each stage of the Data Creation Cycle ( The PID-Service is implemented as a RESTful web service and the software is continuously being developed by EPIC. For the complete APIs documentation, please read DARIAH Storage API The Storage API supports the creation and enhancement of data infrastructures for the management of research data [12]. The API is RESTful and it supports access from a web browser or an ECP client. 9
10 Figure 4 DARIAH Storage Service [12] For the complete APIs documentation, please read [12]. 3. Related Issues Some issues need be addressed regarding interoperability are not in the discussion of this document, but are also under the scope of DARIAH research: How to carry out machine-comprehensible user identification between distinct services and enable personalisation? Please refer to the DARIAH AAI service. What is needed to record a component version, etc. for provenance? Please refer to the DARIAH provenance concept Report [6]. Where are the operations of services monitored, and how does this help both the service provider as well as overall control of the DARIAH ecosystem? Please refer to DARIAH monitoring service [7]. VRE is a user s research environment. It narrows down the potential paths to interoperability. How DARIAH deal with this? DARIAH is going to deliver a service package called Archive-in-a-box (AiB). The AiB service will provide an institution with the facility to install software on its servers in order to create a digital asset management system for its research community. DARIAH AiB concept report [4] requires two more services 10
11 that need to be interoperable in additional to DARIAH core infrastructure services: DARIAH Hosting and Generic search service [8]. There are three candidates will be put through full integration tests: TextGridRep, Pubman and dspace [8]. 4. Roadmap Phase Activities Mo/ Yr to be completed 1 Add collection registry, schema registry and general search services documentations and APIs as web services interoperability user case Oct,2013 Revise DARIAH AAI interoperability requirement based on its latest implementation 2 Integrate the final ready-to-use software solution from AiB (M ) as VRE interoperability user case. Feb, Collate Interoperability user cases from community contributed services Feb,
12 5. Bibliography [1] DARIAH-DE Brochure. (2012). Von [2] Stefan E. Funk, Daniel Kurzawe, Bastien Saquet, Stefan Schmunk. (kein Datum). R 1.3.3, Analyse von technischen ProvenanceModellen und Evaluation der Auswirkungen auf die Interoperabilität von Werkzeugen. [3] Stavros Angelis, Andreas Aschenbrenner, Agiatis Benardou, Tobias Blanke, Natasha Bulatovic and etc. (2010). DARAIAH Technical Report. [4] Lossau, D. N. (2010). DARIAH-DE: Construction of Research Infrastructures for the e- Humanities. [5] Tobias Blanke, Michael Bryant, Mark Hedges. (2011). Preparing DARIAH. 7th IEEE e Science conference. King's College London. [6] Stefan E. Funk, Daniel Kurzawe, Bastien Saquet, Stefan Schmunk. (kein Datum). R 1.3.3, Analyse von technischen ProvenanceModellen und Evaluation der Auswirkungen auf die Interoperabilität von Werkzeugen. [7] DARIAH Service Life Cycle [8] Rainer Becker, Richard Eckart de Castilho. (2012). Archive-in-a-box, Service-Concept, M Technische Universität Darmstadt. [9] DARIAH Montoring Infrastructure [10] EPIC website [11]Peter Gietz, Martin Haase. (2011). DARIAH Authorization and Authentication Infrastructure. [12]Stefan Funk, Peter Gietz, Martin Haase and etc. (2012). DARIAH Storage API- A Basic Storage Service API on Bit Preservation Level. FEA1-D?noredirect 12
DARIAH Storage API A Basic Storage Service API on Bit Preservation Level
DARIAH Storage API A Basic Storage Service API on Bit Preservation Level DARIAH-DE Aufbau von Forschungsinfrastrukturen für die e-humanities Authors: Stefan E. Funk, Peter Gietz, Martin Haase (DAASI International)
More informationDigital Research Infrastructure for the Arts and Humanities. Project Reference Number: 01UG1110A - M
Digital Research Infrastructure for the Arts and Humanities Project Reference Number: 01UG1110A - M Contact Questions about the research project may be directed to dariah-sub@sub.uni-goettingen.de. For
More informationPARTNER INTEGRATION GUIDE. Edition 1.0
PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of
More informationTextGrid as Virtual Research Environment
Exploring Formulaic Knowledge through Languages, Cultures and Time TextGrid as Virtual Research Environment Andrea Rapp, TU Darmstadt rapp@linglit.tu darmstadt.de Table of Contents TextGrid Concept & Project
More informationIVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
More informationfor High Performance Computing
Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov
More informationSOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
More informationRDA Report Working Meeting Session 5 IG Federated Identity Management. Presentations
RDA Report Working Meeting Session 5 IG Federated Identity Management Notes by F VandenBoom Presentations The AARC project, report by Licia Florio https://aarcproject.eu by improving the interoperability
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationFederated Identity Architectures
Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,
More informationIAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
More informationDr.M.G.R. Educational and Research Institute, Chennai, India. Dr.M.G.R. Educational and Research Institute, Chennai, India
An Interface using SOA Framework For Mediclaim Provider S. Nirmala Sugirtha Rajini Dr.M.G.R. Educational and Research Institute, Chennai, India Dr. T. Bhuvaneswari Dr.M.G.R. Educational and Research Institute,
More informationSAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, pskopek@redhat.com, twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
More informationResearch and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
More informationSTUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. venkadeshkumaresan@yahoo.co.in 2 Professor-CSC
More informationFederations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
More informationSoftware Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: dev@opensso.dev.java.net This document is subject to the following license:
More informationAAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle lukas.haemmerle@switch.ch Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
More informationArchiving Systems. Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie. uwe.borghoff@unibw.
Archiving Systems Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie uwe.borghoff@unibw.de Decision Process Reference Models Technologies Use Cases
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationIntroduction. C a p a b i l i t y d o c u m e n t : B i z T a l k S e r v e r
Microsoft Technology Practice Capability document Overview Microsoft BizTalk Server is the middleware application server providing Business Process Management, Process Automations along with SOA / ESB
More informationIntalio BPM. The first and only complete Open Source Business Process Management System
Intalio BPM The first and only complete Open Source Business Process Management System Presenter Jason Howlett Process Expert Employee for Intalio EMEA Based in England Enabling Intalio customers to build
More informationCloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationTextGrid Research Infrastructure for the e-humanities
TMS - Text Mining Services Leipzig, 25.03.2009 TextGrid Research Infrastructure for the e-humanities Martina Kerzel Goettingen State and University Library Research & Development Department kerzel@sub.uni-goettingen.de
More informationHow Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data
2014 Fifth International Conference on Computing for Geospatial Research and Application How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data Andreas Matheus University of
More informationFederated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure Ahmed Shiraz Memon (JSC - DE) Jens Jensen (STFC escience - UK) Ales Cernivec (XLAB - SL) Krzysztof Benedyczak
More informationEvaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
More informationEHR Standards Landscape
EHR Standards Landscape Dr Dipak Kalra Centre for Health Informatics and Multiprofessional Education (CHIME) University College London d.kalra@chime.ucl.ac.uk A trans-national ehealth Infostructure Wellness
More informationPractical Application of Service Oriented Architecture
Practical Application of Service Oriented Architecture Teamcenter SOA Steve Chesney, Siemens PLM Software GPDIS_2012.ppt 1 Teamcenter Architecture Vision The Siemens vision is to create the industry leading
More informationE-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine.
E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine. Yaroshenko Tetiana, yaroshenko[@]ukma.kiev.ua Introduction The Kyiv Mohyla Foundation of America and the National University of Kyiv Mohyla
More information<Insert Picture Here> Building a Complex Web Application Using ADF and Siebel
Building a Complex Web Application Using ADF and Siebel Nishit Rao Group Product Manager Fusion Middleware Oracle Dhiraj Soni Technical Architect GIT Apps Engineering Oracle The following
More informationDistributed systems. Distributed Systems Architectures
Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined
More informationHow To Write The Ceres Software Development Guidelines
MEDIZINISCHE FAKULTÄT RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN INSTITUT FÜR MEDIZINISCHE INFORMATIK GESCHÄFTSFÜHRENDER DIREKTOR: UNIVERSITÄTSPROFESSOR DR. DR. KLAUS SPITZER The CERES Project
More informationIT Architecture and Service Management with ADOit. Product of the BOC Management Office
IT Architecture and Service Management with ADOit Product of the BOC Management Office Moving Towards Sustained Control of Business Architecture and IT Processes: IT Governance Define the Objectives The
More informationCloud and Big Data Standardisation
Cloud and Big Data Standardisation EuroCloud Symposium ICS Track: Standards for Big Data in the Cloud 15 October 2013, Luxembourg Yuri Demchenko System and Network Engineering Group, University of Amsterdam
More informationOpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
More informationDFG form 12.181 03/15 page 1 of 8. for the Purchase of Licences funded by the DFG
form 12.181 03/15 page 1 of 8 Guidelines for the Purchase of Licences funded by the Within the framework of the Alliance Digital Information Initiative, licences for journals, databases and e-books are
More informationBig Data Standardisation in Industry and Research
Big Data Standardisation in Industry and Research EuroCloud Symposium ICS Track: Standards for Big Data in the Cloud 15 October 2013, Luxembourg Yuri Demchenko System and Network Engineering Group, University
More informationAquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
More informationReport to the Technical Advisory Board (TAB) DARIAH- DE and CLARIN- D
Funded under: 01UG1110A until N Report to the Technical Advisory Board (TAB) DARIAH- DE and CLARIN- D February 17th, 2015 Project title: DARIAH- DE Aufbau von Forschungsinfrastrukturen für die e- Humanities
More informationD.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID.
Seite 1 von 11 Distributed Identity Management The intention of Distributed Identity Management is the advancement of the electronic communication infrastructure in justice with the goal of defining open,
More informationSAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
More informationSecuring Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
More informationHow service-oriented architecture (SOA) impacts your IT infrastructure
IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction
More informationWHITE PAPER. Written by: Michael Azoff. Published Mar, 2015, Ovum
Unlocking systems of record with Web and mobile front-ends CA App Services Orchestrator for creating contemporary APIs Written by: Michael Azoff Published Mar, 2015, Ovum CA App Services Orchestrator WWW.OVUM.COM
More informationand Deployment Roadmap for Satellite Ground Systems
A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation
More informationLightweight Data Integration using the WebComposition Data Grid Service
Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed
More informationAuthentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
More informationNTU-IR: An Institutional Repository for Nanyang Technological University using DSpace
Abrizah Abdullah, et al. (Eds.): ICOLIS 2007, Kuala Lumpur: LISU, FCSIT, 2007: pp 103-108 NTU-IR: An Institutional Repository for Nanyang Technological University using DSpace Jayan C Kurian 1, Dion Hoe-Lian
More informationIntroduction to UDDI: Important Features and Functional Concepts
: October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...
More informationREVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES
REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant
More informationUser and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds
J. Sens. Actuator Netw. 2013, 2, 109-121; doi:10.3390/jsan2010109 Article OPEN ACCESS Journal of Sensor and Actuator Networks ISSN 2224-2708 www.mdpi.com/journal/jsan User and Machine Authentication and
More informationTHE NEW DIGITAL EXPERIENCE
steffo.weber@oracle.com SECURING THE NEW DIGITAL EXPERIENCE Dr Steffo Weber, Oracle BridgFilling the UX gap for mobile enterprise applications. May,-2014 Latest Entries Protecting IDPs from malformed SAML
More informationLeveraging the Eclipse TPTP* Agent Infrastructure
2005 Intel Corporation; made available under the EPL v1.0 March 3, 2005 Eclipse is a trademark of Eclipse Foundation, Inc 1 Leveraging the Eclipse TPTP* Agent Infrastructure Andy Kaylor Intel Corporation
More informationOPENGREY: HOW IT WORKS AND HOW IT IS USED
OPENGREY: HOW IT WORKS AND HOW IT IS USED CHRISTIANE STOCK christiane.stock@inist.fr INIST-CNRS, France Abstract OpenGrey is a unique repository providing open access to European grey literature references,
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Internet has revolutionized the world. There seems to be no limit to the imagination of how computers can be used to help mankind. Enterprises are typically comprised of hundreds
More informationPingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
More informationTitle: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: sascha.neinert@rus.uni-stuttgart.de
More informationAgenda. Fusion Middleware Release 12 Fusion Applications
A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12, and Oracle Fusion Middleware John Stouffer Independent Consultant john.stouffer@gmail.com www.justadba.com John Stouffer Connection
More informationOpenAIRE Research Data Management Briefing paper
OpenAIRE Research Data Management Briefing paper Understanding Research Data Management February 2016 H2020-EINFRA-2014-1 Topic: e-infrastructure for Open Access Research & Innovation action Grant Agreement
More informationESA EO Identify Management
ESA EO Identify Management The ESA EO IM Infrastructure & Services A. Baldi ESA: Andrea.Baldi@esa.int M. Leonardi ESA: m.leonardi@rheagroup.com 1 Issues @ ESA with legacy user management Users had multiple
More informationA Quick Introduction to SOA
Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC mmabdallah@itida.gov.eg Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright
More informationOutline. Definitions. Course schedule
SENG480A/CSC576A Topics in Software Engineering Software Development, Architecture & Evolution Lectures, Sep 17, 20, 2001 Hausi A. Müller University of Victoria Outline Assignment 1 due Sep 27 Last week
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationImplementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
More informationSophisticated Common Data Environment (CDE) with BIMaaS Platform
Sophisticated Common Data Environment (CDE) with BIMaaS Platform September 2015 Contents 1. Introduction to BIMaaS Platform... 3 2. What is Common Data Environment?... 3 3. Real World Challenges without
More informationAn empirical study of messaging systems and migration to service-oriented architecture
An empirical study of messaging systems and migration to service-oriented architecture Raouf Alomainy and Wei Li Computer Science Department, University of Alabama in Huntsville, Huntsville, AL 35899 {ralomain,
More informationTHE CCLRC DATA PORTAL
THE CCLRC DATA PORTAL Glen Drinkwater, Shoaib Sufi CCLRC Daresbury Laboratory, Daresbury, Warrington, Cheshire, WA4 4AD, UK. E-mail: g.j.drinkwater@dl.ac.uk, s.a.sufi@dl.ac.uk Abstract: The project aims
More informationSOA CERTIFIED CONSULTANT
SOA CERTIFIED CONSULTANT (5 Days) A Certified SOA Consultant is required to obtain proficiency in a cross-section of key SOA topic areas, including both conceptual and technical aspects of service-oriented
More informationXerox SMart esolutions. Security White Paper
Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation
More informationA Service for Data-Intensive Computations on Virtual Clusters
A Service for Data-Intensive Computations on Virtual Clusters Executing Preservation Strategies at Scale Rainer Schmidt, Christian Sadilek, and Ross King rainer.schmidt@arcs.ac.at Planets Project Permanent
More informationComputer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia ei09095@fe.up.pt Pedro Borges ei09063@fe.up.pt December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
More informationFederated Identity Management. Willem Elbers (MPI-TLA) EUDAT training
Federated Identity Management Willem Elbers (MPI-TLA) EUDAT training Date: 26 June 2012 Outline FIM and introduction to components Federation and metadata National Identity federations and inter federations
More informationMobile Applications Developer. MAIN PURPOSE OF JOB To lead the design, development and maintenance of Android, iphone and ipad applications.
Mobile Applications Developer MAIN PURPOSE OF JOB To lead the design, development and maintenance of Android, iphone and ipad applications. The developer will lead the entire application lifecycle right
More informationIBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
More informationDoctoral degree scholarship. in aeronautics and space travel technology
Doctoral degree scholarship in aeronautics and space travel technology Scholarship program Munich Aerospace grants scholarships to support young scientists in their doctoral studies. The scholarships are
More informationWeb Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
More informationDesire2Learn Integrations and Customizations
Desire2Learn Integrations and Customizations ABOUT THIS DOCUMENT This document has been designed for prospective Desire2Learn clients whose organization is interested in understanding the various integrations
More informationOracle Data Integrator 11g: Integration and Administration
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive
More informationHow To Compare The Cost Of Business Process Management (Bpm) To Open Source Software (Bmp)
Open Source Business Process Management Suites Trends and Advantages Executive Summary This paper explains open source BPM and its benefits. Focused and in-depth description of two major open source BPM
More informationA Service Oriented Security Reference Architecture
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service
More informationA new web based elearning Platform for Building Simulation
A new web based elearning Platform for Building Simulation Arne Abromeit 1, Andreas Wagner 1 Abstract The use of web based building simulation enables students to study building s performance under various
More informationA Comprehensive Study on Cloud Computing Standardization
A Comprehensive Study on Cloud Computing Standardization Dr. Mukesh Chandra Negi Project Manager, Tech Mahindra Ltd, Noida, India ABSTRACT: Standard is a trust between standardization body, buyers and
More informationMobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems jmacy@forumsys.com
Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems jmacy@forumsys.com Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service
More informationDistributed Systems and Recent Innovations: Challenges and Benefits
Distributed Systems and Recent Innovations: Challenges and Benefits 1. Introduction Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department
More informationSo You Want an SOA: Best Practices for Migrating to SOA in the Enterprise. Eric Newcomer, CTO
So You Want an SOA: Best Practices for Migrating to SOA in the Enterprise Eric Newcomer, CTO Overview First of all: concepts and definitions Change your thinking about your IT environment Including organization
More informationAquaLogic ESB Design and Integration (3 Days)
www.peaksolutions.com AquaLogic ESB Design and Integration (3 Days) Audience Course Abstract Designed for developers, project leaders, IT architects and other technical individuals that need to understand
More informationTest Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
More informationA Service-oriented Architecture for Business Intelligence
A Service-oriented Architecture for Business Intelligence Liya Wu 1, Gilad Barash 1, Claudio Bartolini 2 1 HP Software 2 HP Laboratories {name.surname@hp.com} Abstract Business intelligence is a business
More informationHP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
More informationFederated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology jkallela@cc.hut.fi Abstract Federated identity management allows users to access multiple services based on a single
More informationInteroperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A Guide November, 2014 Contents Acknowledgements... 3 Motivation and Considerations... 4 Interoperability & Portability Overview... 5 Basic Definition
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
More informationChecklist: Persistent identifiers
Checklist: Persistent identifiers Persistent Identifiers (PID) are unique character strings 1 attached to various items. Attached to digital items, they are a prerequisite for linked data. Persistent identifiers
More informationScalable Services for Digital Preservation
Scalable Services for Digital Preservation A Perspective on Cloud Computing Rainer Schmidt, Christian Sadilek, and Ross King Digital Preservation (DP) Providing long-term access to growing collections
More informationArchive-in-a-box. Service-Concept M 1.4.1.1
Archive-in-a-box (Internal Demonstrator) Service-Concept M 1.4.1.1 Version 1.15 (31/08/2012) Work Package 1.4 Responsible Partner Technische Universität Darmstadt DARIAH-DE Aufbau von Forschungsinfrastrukturen
More informationPROGRESS Portal Access Whitepaper
PROGRESS Portal Access Whitepaper Maciej Bogdanski, Michał Kosiedowski, Cezary Mazurek, Marzena Rabiega, Malgorzata Wolniewicz Poznan Supercomputing and Networking Center April 15, 2004 1 Introduction
More informationThe Enterprise Service Bus
1 ESBs: Essential Infrastructure for a Successful SOA March 2005 2 at a glance Customers include world s largest firms! 80% of Global Telecom! 70% of Financial Services in Global 100! Blue Chip System
More informationThe Dangers of Consumer Grade File Sharing in a Compliance Driven World
The Dangers of Consumer Grade File Sharing in a Compliance Driven World Enterprise data access is spiraling out of control owncloud, Inc. 57 Bedford Street Suite 102 Lexington, MA 02420 United States www.owncloud.com/contact
More information