Service Interoperability

Size: px
Start display at page:

Download "Service Interoperability"

Transcription

1 Service Interoperability Multi-Modal Interoperability Concept (M ) Version 12/05/2013 Work Package 1.3 Responsible Partner MPDL DARIAH-DE Aufbau von Forschungsinfrastrukturen für die e-humanities This research and development project is / was funded by the German Federal Ministry of Education and Research (BMBF), fund number 01UG1110A to M, and managed by the Project Management Agency of the German Aerospace Center (Deutsches Zentrum für Luft- und Raumfahrt, PT-DLR).

2 Project: DARIAH-DE: Aufbau von Forschungsinfrastrukturen für die e-humanities BMBF Fund number: 01UG1110A to M Duration: March 2011 till February 2014 Document status: First version Dissemination level: DARIAH-DE-internal Authors: Ye Cao, MPDL Revisions: Date Author Comment 02/18/2013 Ye Cao Outline 03/27/2013 Ye Cao Draft 01/05/2013 Ye Cao Reversion 06/05/2013 Stefan Schmunk Comments 07/05/2013 Peter Gietz / Stefan E. Funk Reversion and Comments 12/05/2013 Ye Cao Reversion according to feedback 2

3 Table of Contents Service Interoperability... 1 Multi-Modal Interoperability Concept (M )... 1 DARIAH-DE... 1 Summary... 4 Purpose and Audience Problem Definition DARIAH Technological Architecture Multi-Modal Concept... 4 Level1 Documented... 5 Level2 Interoperable... 5 Level3 Certified... 5 Exception Core Infrastructure services Interoperability... 6 DARIAH Authorization and Authentication (AA) Service... 6 DARIAH Persistent Identifiers (PID) service... 8 DARIAH Storage API Related Issues Roadmap Bibliography

4 Summary This document introduces the interoperability concept for DARIAH technical services. It starts with setting scope of the topic. The main part lies on the multi-modal Interoperability model concept and best practices. The closing chapter give interoperability guide with DARIAH core infrastructure services. Purpose and Audience The proposed interoperability model can be applied to facilitate interoperability between the technical services created by independent stakeholders. This document has been written for DARIAH partners and DARIAH community to give recommendation so that how services could be interoperable with DARIAH infrastructure. 1. Problem Definition Interoperability is a very broad topic and it includes many aspects, e.g., the use of protocols and machine interfaces for accessing data, interoperability of data and metadata formats, adoption of open data licenses, and the use of machine-readable license formats [1]. Technical interoperability is complements of data interoperability [2]. It is said interoperability touches different levels of exchange. The most basic of these is the technical or system level [3]. The term service refers to a set of related software functionalities that can be accessed via application programming interface (API). A tool covers one specific scholarly activity, e.g. XML editor and it requires user interaction. The service interoperability discussed here includes both tools and services. 2. DARIAH Technological Architecture The technological architecture of DARIAH is service oriented architecture (SOA) [4]. The big advantage of SOA architecture is that users can implement their own services as modules that can be used to expand the available services. This approach will ensure that new developers will be able to plug their own tools into the DARIAH architecture or one can combine these services by building higher level services on top of existing ones Multi-Modal Concept The DARIAH technical report [5] defines 3 levels of service Interoperability: Documented, Interoperable and Certified. Services in DARIAH need to be at least documented, should be interoperable and can finally be fully DARIAH-certified. Each compliance level is a step further into the DARIAH ecosystem, with more responsibilities but also more opportunities to benefit from [5]. 4

5 Level1 Documented Exhaustive documentation is available to employ and adapt the component; ideally its source code is openly available. However, standards-based interfaces may be missing and any interaction with other components may need to be hard-coded into the software. Moreover, documentation and transparency of research services may be required for good scholarly practice, and they may hence be the key to trust. Level2 Interoperable The service is well-documented, and it offers standards-based technical interfaces to interact with other components in the DARIAH ecosystem. Interoperable services are capable of interacting with DARIAH core services including DARIAH Authentication and Authorization Infrastructure (AAI) and persistent identifiers (PID) services. Core services are essential for enabling interoperability across the heterogeneous data sources and decentralised services in the DARIAH ecosystem. Best Practices Applying standard web services interfaces, i.e., SOAP and REST-based services. Applying open standards,.e.g., OAI-PMH, RSS to expose reusable services. Promotion of applications based on DARIAH services for several use cases. Dedicated education and outreach activities from AP2 are expected. Specific technical paradigm, e.g., an Eclipse Rich Client with graphical user interfaces or a Virtual research environment (VRE), should be at least interoperable with DARIAH core services and involved service environment. Level3 Certified At the highest integration level, DARIAH aims to certify services based on existing best practices and relevant international standards. The organisational context of the component ensures the maintenance of the software and potentially migration paths to successors. For hosted services, the host institution ensures its availability, responsible management of any user-specific data, and other aspects usually discussed in service level agreements. Best Practices DARIAH service lifecycle [7] practise DARIAH service quality Assurance procedure. A certified service means it will pass the usability and value check by a team of scientific and technological mentors, so it can be hosted by DARIAH permanently. 5

6 Figure 1 DARIAH Service Life Cycle [7] state diagram shows how a new service could be integrated into the DARIAH infrastructure. Exception Individual components have three integration levels. However there are different channels for technical interoperability, not all services in the DARIAH ecosystem must be capable of interacting with each other Core Infrastructure services Interoperability The Core Infrastructure services are those that are essential to the running of the infrastructure and upon which other service are built and rely. So Interoperability with these services needs to be considered. DARIAH Authorization and Authentication (AA) Service Currently DARIAH deploys its AA service based on two standards: SAML and LDAP. It supports both Web Browser Single Sign-on (SSO) and Enhanced Client or Proxy (ECP) user cases. 6

7 Figure 2 Web Browser VS ECP client user cases [11] For Service providers (SP): SP are free to implement its service in SSO or ECP way. DARIAH Plans to adopt OAuth2 standard to facility SP, so developers only need to support one API only. For specific research project who wants to use DARIAH services, one coordinating facility will be assigned and at least two project administrators, i.e., a contact person and a representative are required according to DARIAH AAI role model. For the complete DARIAH AAI concept, please read [11] 7

8 Figure 3 DARIAH AAI Role Model [11] DARIAH Persistent Identifiers (PID) service The PID resolution and PID management is not built up by DARIAH, but DARIAH relies on the PID-Service of the European Persistent Identifier Consortium (EPIC). The PID development within DARIAH is coordinated with EPIC. EPIC is Handle based identifier system. Its focus is the registration of data in an early state of the scientific process, where lots of data is generated and has to become referable to collaborate with other scientific groups or communities [10]. The Digital Object Identifier (DOI) is widely used by the publishing industry for the persistent identification of journal articles. If a later registration with a DOI is wanted for some reason, the PIDs can be transferred because the identifier systems use the same underlying handle software. 8

9 Figure 3 Different PID is needed in each stage of the Data Creation Cycle ( The PID-Service is implemented as a RESTful web service and the software is continuously being developed by EPIC. For the complete APIs documentation, please read DARIAH Storage API The Storage API supports the creation and enhancement of data infrastructures for the management of research data [12]. The API is RESTful and it supports access from a web browser or an ECP client. 9

10 Figure 4 DARIAH Storage Service [12] For the complete APIs documentation, please read [12]. 3. Related Issues Some issues need be addressed regarding interoperability are not in the discussion of this document, but are also under the scope of DARIAH research: How to carry out machine-comprehensible user identification between distinct services and enable personalisation? Please refer to the DARIAH AAI service. What is needed to record a component version, etc. for provenance? Please refer to the DARIAH provenance concept Report [6]. Where are the operations of services monitored, and how does this help both the service provider as well as overall control of the DARIAH ecosystem? Please refer to DARIAH monitoring service [7]. VRE is a user s research environment. It narrows down the potential paths to interoperability. How DARIAH deal with this? DARIAH is going to deliver a service package called Archive-in-a-box (AiB). The AiB service will provide an institution with the facility to install software on its servers in order to create a digital asset management system for its research community. DARIAH AiB concept report [4] requires two more services 10

11 that need to be interoperable in additional to DARIAH core infrastructure services: DARIAH Hosting and Generic search service [8]. There are three candidates will be put through full integration tests: TextGridRep, Pubman and dspace [8]. 4. Roadmap Phase Activities Mo/ Yr to be completed 1 Add collection registry, schema registry and general search services documentations and APIs as web services interoperability user case Oct,2013 Revise DARIAH AAI interoperability requirement based on its latest implementation 2 Integrate the final ready-to-use software solution from AiB (M ) as VRE interoperability user case. Feb, Collate Interoperability user cases from community contributed services Feb,

12 5. Bibliography [1] DARIAH-DE Brochure. (2012). Von [2] Stefan E. Funk, Daniel Kurzawe, Bastien Saquet, Stefan Schmunk. (kein Datum). R 1.3.3, Analyse von technischen ProvenanceModellen und Evaluation der Auswirkungen auf die Interoperabilität von Werkzeugen. [3] Stavros Angelis, Andreas Aschenbrenner, Agiatis Benardou, Tobias Blanke, Natasha Bulatovic and etc. (2010). DARAIAH Technical Report. [4] Lossau, D. N. (2010). DARIAH-DE: Construction of Research Infrastructures for the e- Humanities. [5] Tobias Blanke, Michael Bryant, Mark Hedges. (2011). Preparing DARIAH. 7th IEEE e Science conference. King's College London. [6] Stefan E. Funk, Daniel Kurzawe, Bastien Saquet, Stefan Schmunk. (kein Datum). R 1.3.3, Analyse von technischen ProvenanceModellen und Evaluation der Auswirkungen auf die Interoperabilität von Werkzeugen. [7] DARIAH Service Life Cycle [8] Rainer Becker, Richard Eckart de Castilho. (2012). Archive-in-a-box, Service-Concept, M Technische Universität Darmstadt. [9] DARIAH Montoring Infrastructure [10] EPIC website [11]Peter Gietz, Martin Haase. (2011). DARIAH Authorization and Authentication Infrastructure. [12]Stefan Funk, Peter Gietz, Martin Haase and etc. (2012). DARIAH Storage API- A Basic Storage Service API on Bit Preservation Level. FEA1-D?noredirect 12

DARIAH Storage API A Basic Storage Service API on Bit Preservation Level

DARIAH Storage API A Basic Storage Service API on Bit Preservation Level DARIAH Storage API A Basic Storage Service API on Bit Preservation Level DARIAH-DE Aufbau von Forschungsinfrastrukturen für die e-humanities Authors: Stefan E. Funk, Peter Gietz, Martin Haase (DAASI International)

More information

Digital Research Infrastructure for the Arts and Humanities. Project Reference Number: 01UG1110A - M

Digital Research Infrastructure for the Arts and Humanities. Project Reference Number: 01UG1110A - M Digital Research Infrastructure for the Arts and Humanities Project Reference Number: 01UG1110A - M Contact Questions about the research project may be directed to dariah-sub@sub.uni-goettingen.de. For

More information

PARTNER INTEGRATION GUIDE. Edition 1.0

PARTNER INTEGRATION GUIDE. Edition 1.0 PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of

More information

TextGrid as Virtual Research Environment

TextGrid as Virtual Research Environment Exploring Formulaic Knowledge through Languages, Cultures and Time TextGrid as Virtual Research Environment Andrea Rapp, TU Darmstadt rapp@linglit.tu darmstadt.de Table of Contents TextGrid Concept & Project

More information

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices

More information

for High Performance Computing

for High Performance Computing Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

RDA Report Working Meeting Session 5 IG Federated Identity Management. Presentations

RDA Report Working Meeting Session 5 IG Federated Identity Management. Presentations RDA Report Working Meeting Session 5 IG Federated Identity Management Notes by F VandenBoom Presentations The AARC project, report by Licia Florio https://aarcproject.eu by improving the interoperability

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information

IAM Application Integration Guide

IAM Application Integration Guide IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document

More information

Dr.M.G.R. Educational and Research Institute, Chennai, India. Dr.M.G.R. Educational and Research Institute, Chennai, India

Dr.M.G.R. Educational and Research Institute, Chennai, India. Dr.M.G.R. Educational and Research Institute, Chennai, India An Interface using SOA Framework For Mediclaim Provider S. Nirmala Sugirtha Rajini Dr.M.G.R. Educational and Research Institute, Chennai, India Dr. T. Bhuvaneswari Dr.M.G.R. Educational and Research Institute,

More information

SAML and OAUTH comparison

SAML and OAUTH comparison SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, pskopek@redhat.com, twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single

More information

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software

More information

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. venkadeshkumaresan@yahoo.co.in 2 Professor-CSC

More information

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI

More information

Software Requirement Specification Web Services Security

Software Requirement Specification Web Services Security Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: dev@opensso.dev.java.net This document is subject to the following license:

More information

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle lukas.haemmerle@switch.ch Berne, 13. August 2014 Introduction App by University of St. Gallen Universities

More information

Archiving Systems. Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie. uwe.borghoff@unibw.

Archiving Systems. Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie. uwe.borghoff@unibw. Archiving Systems Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie uwe.borghoff@unibw.de Decision Process Reference Models Technologies Use Cases

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

Introduction. C a p a b i l i t y d o c u m e n t : B i z T a l k S e r v e r

Introduction. C a p a b i l i t y d o c u m e n t : B i z T a l k S e r v e r Microsoft Technology Practice Capability document Overview Microsoft BizTalk Server is the middleware application server providing Business Process Management, Process Automations along with SOA / ESB

More information

Intalio BPM. The first and only complete Open Source Business Process Management System

Intalio BPM. The first and only complete Open Source Business Process Management System Intalio BPM The first and only complete Open Source Business Process Management System Presenter Jason Howlett Process Expert Employee for Intalio EMEA Based in England Enabling Intalio customers to build

More information

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

TextGrid Research Infrastructure for the e-humanities

TextGrid Research Infrastructure for the e-humanities TMS - Text Mining Services Leipzig, 25.03.2009 TextGrid Research Infrastructure for the e-humanities Martina Kerzel Goettingen State and University Library Research & Development Department kerzel@sub.uni-goettingen.de

More information

How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data

How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data 2014 Fifth International Conference on Computing for Geospatial Research and Application How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data Andreas Matheus University of

More information

Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure

Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure Ahmed Shiraz Memon (JSC - DE) Jens Jensen (STFC escience - UK) Ales Cernivec (XLAB - SL) Krzysztof Benedyczak

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

EHR Standards Landscape

EHR Standards Landscape EHR Standards Landscape Dr Dipak Kalra Centre for Health Informatics and Multiprofessional Education (CHIME) University College London d.kalra@chime.ucl.ac.uk A trans-national ehealth Infostructure Wellness

More information

Practical Application of Service Oriented Architecture

Practical Application of Service Oriented Architecture Practical Application of Service Oriented Architecture Teamcenter SOA Steve Chesney, Siemens PLM Software GPDIS_2012.ppt 1 Teamcenter Architecture Vision The Siemens vision is to create the industry leading

More information

E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine.

E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine. E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine. Yaroshenko Tetiana, yaroshenko[@]ukma.kiev.ua Introduction The Kyiv Mohyla Foundation of America and the National University of Kyiv Mohyla

More information

<Insert Picture Here> Building a Complex Web Application Using ADF and Siebel

<Insert Picture Here> Building a Complex Web Application Using ADF and Siebel Building a Complex Web Application Using ADF and Siebel Nishit Rao Group Product Manager Fusion Middleware Oracle Dhiraj Soni Technical Architect GIT Apps Engineering Oracle The following

More information

Distributed systems. Distributed Systems Architectures

Distributed systems. Distributed Systems Architectures Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined

More information

How To Write The Ceres Software Development Guidelines

How To Write The Ceres Software Development Guidelines MEDIZINISCHE FAKULTÄT RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN INSTITUT FÜR MEDIZINISCHE INFORMATIK GESCHÄFTSFÜHRENDER DIREKTOR: UNIVERSITÄTSPROFESSOR DR. DR. KLAUS SPITZER The CERES Project

More information

IT Architecture and Service Management with ADOit. Product of the BOC Management Office

IT Architecture and Service Management with ADOit. Product of the BOC Management Office IT Architecture and Service Management with ADOit Product of the BOC Management Office Moving Towards Sustained Control of Business Architecture and IT Processes: IT Governance Define the Objectives The

More information

Cloud and Big Data Standardisation

Cloud and Big Data Standardisation Cloud and Big Data Standardisation EuroCloud Symposium ICS Track: Standards for Big Data in the Cloud 15 October 2013, Luxembourg Yuri Demchenko System and Network Engineering Group, University of Amsterdam

More information

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the

More information

DFG form 12.181 03/15 page 1 of 8. for the Purchase of Licences funded by the DFG

DFG form 12.181 03/15 page 1 of 8. for the Purchase of Licences funded by the DFG form 12.181 03/15 page 1 of 8 Guidelines for the Purchase of Licences funded by the Within the framework of the Alliance Digital Information Initiative, licences for journals, databases and e-books are

More information

Big Data Standardisation in Industry and Research

Big Data Standardisation in Industry and Research Big Data Standardisation in Industry and Research EuroCloud Symposium ICS Track: Standards for Big Data in the Cloud 15 October 2013, Luxembourg Yuri Demchenko System and Network Engineering Group, University

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

Report to the Technical Advisory Board (TAB) DARIAH- DE and CLARIN- D

Report to the Technical Advisory Board (TAB) DARIAH- DE and CLARIN- D Funded under: 01UG1110A until N Report to the Technical Advisory Board (TAB) DARIAH- DE and CLARIN- D February 17th, 2015 Project title: DARIAH- DE Aufbau von Forschungsinfrastrukturen für die e- Humanities

More information

D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID.

D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID. Seite 1 von 11 Distributed Identity Management The intention of Distributed Identity Management is the advancement of the electronic communication infrastructure in justice with the goal of defining open,

More information

SAML Federated Identity at OASIS

SAML Federated Identity at OASIS International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for

More information

Securing Web Services With SAML

Securing Web Services With SAML Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion

More information

How service-oriented architecture (SOA) impacts your IT infrastructure

How service-oriented architecture (SOA) impacts your IT infrastructure IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction

More information

WHITE PAPER. Written by: Michael Azoff. Published Mar, 2015, Ovum

WHITE PAPER. Written by: Michael Azoff. Published Mar, 2015, Ovum Unlocking systems of record with Web and mobile front-ends CA App Services Orchestrator for creating contemporary APIs Written by: Michael Azoff Published Mar, 2015, Ovum CA App Services Orchestrator WWW.OVUM.COM

More information

and Deployment Roadmap for Satellite Ground Systems

and Deployment Roadmap for Satellite Ground Systems A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

NTU-IR: An Institutional Repository for Nanyang Technological University using DSpace

NTU-IR: An Institutional Repository for Nanyang Technological University using DSpace Abrizah Abdullah, et al. (Eds.): ICOLIS 2007, Kuala Lumpur: LISU, FCSIT, 2007: pp 103-108 NTU-IR: An Institutional Repository for Nanyang Technological University using DSpace Jayan C Kurian 1, Dion Hoe-Lian

More information

Introduction to UDDI: Important Features and Functional Concepts

Introduction to UDDI: Important Features and Functional Concepts : October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant

More information

User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds J. Sens. Actuator Netw. 2013, 2, 109-121; doi:10.3390/jsan2010109 Article OPEN ACCESS Journal of Sensor and Actuator Networks ISSN 2224-2708 www.mdpi.com/journal/jsan User and Machine Authentication and

More information

THE NEW DIGITAL EXPERIENCE

THE NEW DIGITAL EXPERIENCE steffo.weber@oracle.com SECURING THE NEW DIGITAL EXPERIENCE Dr Steffo Weber, Oracle BridgFilling the UX gap for mobile enterprise applications. May,-2014 Latest Entries Protecting IDPs from malformed SAML

More information

Leveraging the Eclipse TPTP* Agent Infrastructure

Leveraging the Eclipse TPTP* Agent Infrastructure 2005 Intel Corporation; made available under the EPL v1.0 March 3, 2005 Eclipse is a trademark of Eclipse Foundation, Inc 1 Leveraging the Eclipse TPTP* Agent Infrastructure Andy Kaylor Intel Corporation

More information

OPENGREY: HOW IT WORKS AND HOW IT IS USED

OPENGREY: HOW IT WORKS AND HOW IT IS USED OPENGREY: HOW IT WORKS AND HOW IT IS USED CHRISTIANE STOCK christiane.stock@inist.fr INIST-CNRS, France Abstract OpenGrey is a unique repository providing open access to European grey literature references,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Internet has revolutionized the world. There seems to be no limit to the imagination of how computers can be used to help mankind. Enterprises are typically comprised of hundreds

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: sascha.neinert@rus.uni-stuttgart.de

More information

Agenda. Fusion Middleware Release 12 Fusion Applications

Agenda. Fusion Middleware Release 12 Fusion Applications A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12, and Oracle Fusion Middleware John Stouffer Independent Consultant john.stouffer@gmail.com www.justadba.com John Stouffer Connection

More information

OpenAIRE Research Data Management Briefing paper

OpenAIRE Research Data Management Briefing paper OpenAIRE Research Data Management Briefing paper Understanding Research Data Management February 2016 H2020-EINFRA-2014-1 Topic: e-infrastructure for Open Access Research & Innovation action Grant Agreement

More information

ESA EO Identify Management

ESA EO Identify Management ESA EO Identify Management The ESA EO IM Infrastructure & Services A. Baldi ESA: Andrea.Baldi@esa.int M. Leonardi ESA: m.leonardi@rheagroup.com 1 Issues @ ESA with legacy user management Users had multiple

More information

A Quick Introduction to SOA

A Quick Introduction to SOA Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC mmabdallah@itida.gov.eg Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright

More information

Outline. Definitions. Course schedule

Outline. Definitions. Course schedule SENG480A/CSC576A Topics in Software Engineering Software Development, Architecture & Evolution Lectures, Sep 17, 20, 2001 Hausi A. Müller University of Victoria Outline Assignment 1 due Sep 27 Last week

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Sophisticated Common Data Environment (CDE) with BIMaaS Platform

Sophisticated Common Data Environment (CDE) with BIMaaS Platform Sophisticated Common Data Environment (CDE) with BIMaaS Platform September 2015 Contents 1. Introduction to BIMaaS Platform... 3 2. What is Common Data Environment?... 3 3. Real World Challenges without

More information

An empirical study of messaging systems and migration to service-oriented architecture

An empirical study of messaging systems and migration to service-oriented architecture An empirical study of messaging systems and migration to service-oriented architecture Raouf Alomainy and Wei Li Computer Science Department, University of Alabama in Huntsville, Huntsville, AL 35899 {ralomain,

More information

THE CCLRC DATA PORTAL

THE CCLRC DATA PORTAL THE CCLRC DATA PORTAL Glen Drinkwater, Shoaib Sufi CCLRC Daresbury Laboratory, Daresbury, Warrington, Cheshire, WA4 4AD, UK. E-mail: g.j.drinkwater@dl.ac.uk, s.a.sufi@dl.ac.uk Abstract: The project aims

More information

SOA CERTIFIED CONSULTANT

SOA CERTIFIED CONSULTANT SOA CERTIFIED CONSULTANT (5 Days) A Certified SOA Consultant is required to obtain proficiency in a cross-section of key SOA topic areas, including both conceptual and technical aspects of service-oriented

More information

Xerox SMart esolutions. Security White Paper

Xerox SMart esolutions. Security White Paper Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation

More information

A Service for Data-Intensive Computations on Virtual Clusters

A Service for Data-Intensive Computations on Virtual Clusters A Service for Data-Intensive Computations on Virtual Clusters Executing Preservation Strategies at Scale Rainer Schmidt, Christian Sadilek, and Ross King rainer.schmidt@arcs.ac.at Planets Project Permanent

More information

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt Computer Systems Security 2013/2014 Single Sign-On Bruno Maia ei09095@fe.up.pt Pedro Borges ei09063@fe.up.pt December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................

More information

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training Federated Identity Management Willem Elbers (MPI-TLA) EUDAT training Date: 26 June 2012 Outline FIM and introduction to components Federation and metadata National Identity federations and inter federations

More information

Mobile Applications Developer. MAIN PURPOSE OF JOB To lead the design, development and maintenance of Android, iphone and ipad applications.

Mobile Applications Developer. MAIN PURPOSE OF JOB To lead the design, development and maintenance of Android, iphone and ipad applications. Mobile Applications Developer MAIN PURPOSE OF JOB To lead the design, development and maintenance of Android, iphone and ipad applications. The developer will lead the entire application lifecycle right

More information

IBM Tivoli Federated Identity Manager

IBM Tivoli Federated Identity Manager IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations

More information

Doctoral degree scholarship. in aeronautics and space travel technology

Doctoral degree scholarship. in aeronautics and space travel technology Doctoral degree scholarship in aeronautics and space travel technology Scholarship program Munich Aerospace grants scholarships to support young scientists in their doctoral studies. The scholarships are

More information

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion. Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On

More information

Desire2Learn Integrations and Customizations

Desire2Learn Integrations and Customizations Desire2Learn Integrations and Customizations ABOUT THIS DOCUMENT This document has been designed for prospective Desire2Learn clients whose organization is interested in understanding the various integrations

More information

Oracle Data Integrator 11g: Integration and Administration

Oracle Data Integrator 11g: Integration and Administration Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive

More information

How To Compare The Cost Of Business Process Management (Bpm) To Open Source Software (Bmp)

How To Compare The Cost Of Business Process Management (Bpm) To Open Source Software (Bmp) Open Source Business Process Management Suites Trends and Advantages Executive Summary This paper explains open source BPM and its benefits. Focused and in-depth description of two major open source BPM

More information

A Service Oriented Security Reference Architecture

A Service Oriented Security Reference Architecture International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service

More information

A new web based elearning Platform for Building Simulation

A new web based elearning Platform for Building Simulation A new web based elearning Platform for Building Simulation Arne Abromeit 1, Andreas Wagner 1 Abstract The use of web based building simulation enables students to study building s performance under various

More information

A Comprehensive Study on Cloud Computing Standardization

A Comprehensive Study on Cloud Computing Standardization A Comprehensive Study on Cloud Computing Standardization Dr. Mukesh Chandra Negi Project Manager, Tech Mahindra Ltd, Noida, India ABSTRACT: Standard is a trust between standardization body, buyers and

More information

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems jmacy@forumsys.com

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems jmacy@forumsys.com Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems jmacy@forumsys.com Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service

More information

Distributed Systems and Recent Innovations: Challenges and Benefits

Distributed Systems and Recent Innovations: Challenges and Benefits Distributed Systems and Recent Innovations: Challenges and Benefits 1. Introduction Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department

More information

So You Want an SOA: Best Practices for Migrating to SOA in the Enterprise. Eric Newcomer, CTO

So You Want an SOA: Best Practices for Migrating to SOA in the Enterprise. Eric Newcomer, CTO So You Want an SOA: Best Practices for Migrating to SOA in the Enterprise Eric Newcomer, CTO Overview First of all: concepts and definitions Change your thinking about your IT environment Including organization

More information

AquaLogic ESB Design and Integration (3 Days)

AquaLogic ESB Design and Integration (3 Days) www.peaksolutions.com AquaLogic ESB Design and Integration (3 Days) Audience Course Abstract Designed for developers, project leaders, IT architects and other technical individuals that need to understand

More information

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to

More information

A Service-oriented Architecture for Business Intelligence

A Service-oriented Architecture for Business Intelligence A Service-oriented Architecture for Business Intelligence Liya Wu 1, Gilad Barash 1, Claudio Bartolini 2 1 HP Software 2 HP Laboratories {name.surname@hp.com} Abstract Business intelligence is a business

More information

HP Software as a Service. Federated SSO Guide

HP Software as a Service. Federated SSO Guide HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology jkallela@cc.hut.fi Abstract Federated identity management allows users to access multiple services based on a single

More information

Interoperability and Portability for Cloud Computing: A Guide

Interoperability and Portability for Cloud Computing: A Guide Interoperability and Portability for Cloud Computing: A Guide November, 2014 Contents Acknowledgements... 3 Motivation and Considerations... 4 Interoperability & Portability Overview... 5 Basic Definition

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Checklist: Persistent identifiers

Checklist: Persistent identifiers Checklist: Persistent identifiers Persistent Identifiers (PID) are unique character strings 1 attached to various items. Attached to digital items, they are a prerequisite for linked data. Persistent identifiers

More information

Scalable Services for Digital Preservation

Scalable Services for Digital Preservation Scalable Services for Digital Preservation A Perspective on Cloud Computing Rainer Schmidt, Christian Sadilek, and Ross King Digital Preservation (DP) Providing long-term access to growing collections

More information

Archive-in-a-box. Service-Concept M 1.4.1.1

Archive-in-a-box. Service-Concept M 1.4.1.1 Archive-in-a-box (Internal Demonstrator) Service-Concept M 1.4.1.1 Version 1.15 (31/08/2012) Work Package 1.4 Responsible Partner Technische Universität Darmstadt DARIAH-DE Aufbau von Forschungsinfrastrukturen

More information

PROGRESS Portal Access Whitepaper

PROGRESS Portal Access Whitepaper PROGRESS Portal Access Whitepaper Maciej Bogdanski, Michał Kosiedowski, Cezary Mazurek, Marzena Rabiega, Malgorzata Wolniewicz Poznan Supercomputing and Networking Center April 15, 2004 1 Introduction

More information

The Enterprise Service Bus

The Enterprise Service Bus 1 ESBs: Essential Infrastructure for a Successful SOA March 2005 2 at a glance Customers include world s largest firms! 80% of Global Telecom! 70% of Financial Services in Global 100! Blue Chip System

More information

The Dangers of Consumer Grade File Sharing in a Compliance Driven World

The Dangers of Consumer Grade File Sharing in a Compliance Driven World The Dangers of Consumer Grade File Sharing in a Compliance Driven World Enterprise data access is spiraling out of control owncloud, Inc. 57 Bedford Street Suite 102 Lexington, MA 02420 United States www.owncloud.com/contact

More information