Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants
|
|
- Laureen Ross
- 6 years ago
- Views:
Transcription
1 Global Reference Architecture: Overview of National Standards Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants
2 Goals for this Presentation Define the Global Reference Architecture (GRA) Discuss information sharing standards Introduce proven approaches Present the Global Information Sharing Toolkit (GIST)
3 GRA Overview The Problem Silos of Information Existing systems are mostly custom built, use custom means for integration, and exemplify stand-alone silos of data that make it costly and inefficient for sharing information
4 Foundation Plan Agreement Blueprint What is Architecture? for information sharing decision-making following the principles of Service Oriented Architecture (SOA)
5 What is SOA? Service-Oriented Architecture (SOA) is a set of principles and methodologies for designing and developing software in the form of interoperable services. These services are well-defined business functionalities that are built as software components (discrete pieces of code and/or data structures) that can be reused for different purposes. Wikipedia
6 SOA An approach to developing software capabilities that support information sharing requirements Implemented through the use of Services (software components) SOA is a discipline, a philosophy, a set of principles NOT a purchased technology
7 What is Global? Global is a Federal advisory committee of justice stakeholders that supports establishing consistent and effective information exchange. Global assists the U.S. DOJ to establish and develop: Content Standards What the data will look like Sharing Standards How data will be shared Policy Requirements Privacy and confidentiality restrictions
8 What is the GRA? The GRA is a special case of SOA, or an Service Orientated Architecture approach tailored to meet the requirements of the justice community defined by a collection of Specifications, Profiles and Guidelines GRA leverages concepts that provide standards for efficiently sharing capabilities and infrastructure
9 GRA Principles Standard Service Contracts service must advertise purpose and capabilities Loose Coupling respect service boundaries; limit or eliminate any dependency across services. This promotes the independent design and evolution of a service's logic Abstraction emphasizes the need to hide as much of the underlying details of a service as possible. Doing so directly enables and preserves loose coupling Reuse the service serves its purposes in multiple implementations Autonomy having a high amount of control over underlying runtime environment Statelessness minimize resource consumption by removing state from service functioning Composability ability to use multiple services to solve a single problem
10 Why Use the GRA? In 2004, Global encouraged the national justice community to adopt SOA as the standard approach to justice and public safety information sharing The GRA is the culmination of Global s efforts to follow through on this recommendation by making it easier for state, local, and tribal justice agencies to adopt SOA The GRA provides a complete information sharing solution based on open standards Framework, Profiles, Guidelines, Specifications and Examples
11 Why base the GRA on SOA? SOA is a style of information sharing architecture with these distinguishing features: Keeps implementation separate (service-based) Open (non-proprietary) standards Formal, precise, but minimalist standards (WS.*) Shares common services Reuses components The model is the software Separates integration logic from internal system logic Defines a standard system interface Establishes consistent terminology, guidelines and requirements for service identification, service description and service interaction Provides technology-specific conformance targets, called Service Interaction Profiles (SIPs)
12 Why base the GRA on SOA? Custom builds result in: GRA and SOA help provide: NIEM GRA
13 Global Standards and Initiatives Global Reference Architecture (GRA) Governance Policy and Technical Standards National Information Exchange Model (NIEM) Global Federated Identity and Privilege Management (GFIPM) Single Sign-On Access Control Global Technical Privacy Framework Privacy Policy Rules Enforcement 13
14 GRA Framework The Framework defines a set of key concepts in a standard way, so that across the country, justice practitioners and their industry partners can adopt a consistent vocabulary to communicate about SOA The framework also provides a jumping-off point for the rest of the broader reference architecture, by identifying areas where the community needs more thorough standards and guidelines
15 GRA Concepts and Components
16 GRA Implementations consist of: An architecture for the jurisdiction, using the GRA as a basis Formal agreement among the partners in the jurisdiction to adopt/follow the architecture Commonly-provisioned infrastructure to provide shared execution context Strategy to drive service identification Specifications for initial services Adapters and connectors for initial services
17 GRA Execution Context Connector Intermediary Adapter Intermediaries Justice Line of Business System Apache Camel/ CXF Component Apache Camel/ CXF Component Workflow Apache Camel/ CXF Component Justice Line of Business System Shared Execution Context 17
18 GRA Service Specification Package Formal document of the capabilities made available through a service Describes how a consumer will use a service Describes how a provider will expose a service in a consistent and interoperable manner Blueprint: Design (business and technical) requirements, functionality, standards and other information required to build the service Business process flow Business process model Information model NIEM IEPD
19 GRA Service Specification Package Service Specification Package Business and technical artifacts describing the service Packaged to facilitate discoverability and reuse Service Specification Guideline Practical instructions on how to use the Service Specification Package Conformance requirements
20 Service Payload National Information Exchange Model (NIEM) Common semantics (definitions) Common syntax (structure) for sharing information Example: What is a case number?
21 NIEM Data Model CBRN HHS Infrastructure Protection Person People Organization Things Places Location Immigration Events Property Contact Info Activity Metadata Intelligence Screening Criminal Justice International Trade Emergency Management Family Services
22 NIEM Translation
23 Access Control: Global Resources
24 User Authentication Fine-grained authorization rules Who is the requestor? What information is requested? What is the business purpose for the request? What are the environmental conditions? What obligations must be imposed, if granted?
25 GFIPM The Global Federated Identity and Privilege Management (GFIPM) initiative provides the justice community with a standards-based approach implementing policies regarding authentication and authorization Uses XML and NIEM to provide a standard set of elements and attributes to identify users, describe their privileges, and authenticate them
26 Documenting Policies: GPIQWG 7 Steps to Privacy, Civil Rights, and Civil Liberties Policies Privacy Impact Assessment Privacy Policy Template 238
27 Translating Human-Readable Policies to Machine-Readable Policies Policy Analysts: translate sentences to XACML Policy Matrix Privacy Policy Development Tool
28 XACML Architecture Primer, Readiness Assessment, Case Studies, Resource List, Technical Implementers Guide, and Virtual Machine
29 Application of Global Standards Governance Authorization management Authentication identification Access Control disclosure & use Architecture design Messaging data transport Data message payload
30 GIST Components Data Messaging Architecture Access Control Authentication Federation < Data > Payload Data Transport Structural Design & IS Enablement Data Disclosure & Auditing User Identification & Credentialing Security Management Underlying Technology Standard XML WS* SOAP TCIP/IP HTTP & HTTP/S Global Information Sharing Initiatives SAML XACML AD & LDAP Crypto Trust Model Trust Fabric/ SAML GRA Global Adaptation of Standard NIEM SIP GFIPM Global Technical Privacy Framework Enablement of Interoperability IEPDs SSP Global Adoption GFIPM Metadata Communication Profiles GFIPM Trust Model Federation Management & Trusted Brokers Manifestation in Your Implementation IEPs Adapters & Connectors, Intermediaries Architecture Document SP Services IdP Services Participation in Federation
31 Examples Simple Exchange Reuse of Infrastructure Identity and Privilege Management (GFIPM) Single Sign On Access Control 31
32 Warrant Request Service Warrant Request Flow
33 Infrastructure Reuse Warrant Request Warrant Notification Warrant Issue
34 Federated Query using GFIPM 34
35 Global Standards Benefits Alignment with business drivers Agility - As the business changes, the implementation can quickly change Cost efficiency as services are being reused Reduced risk due to incremental implementation Federal funding opportunities associated with conformance to standards Allow utilizing services as enterprise assets and promote service reuse
36 Global Standards Benefits Increases interoperability between justice and non-justice agency systems Promotes leveraging legacy systems and results in reduction of information sharing cost Facilitate service discoverability Promote consistency which leads to agility Facilitate incremental deployment which results in lower implementation risk GRA (SOA) is Business-Driven
37 Resources and Training Global Initiative: Global Information Sharing Toolkit: National Information Exchange Model (NIEM): Training: NIEM - Technical Privacy - Coming in 2014: GRA SSP GFIPM
NIEM. National. Information. Exchange Model. NIEM and Information Exchanges. <Insert Picture Here> Deploy. Requirements. Model Data.
Deploy Requirements National Test NIEM Model Data Information Build Exchange Generate Dictionary Exchange Model XML Exchange Development NIEM and Information Exchanges Overview Public
More informationKansas ecitation Submission Service Service Description Document
Kansas ecitation Submission Service Service Description Document v 1.0.0 July 15, 2011 Page 1 Table of Contents Document Introduction... 4 ECitation Data Submission Service Overview... 6 Purpose... 6 Scope...
More informationThe Open Group SOA Ontology Technical Standard. Clive Hatton
The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts
More informationPrescription Monitoring Program Information Exchange (PMIX) Architecture. Version 1.0. April 2012
Prescription Monitoring Program Information Exchange (PMIX) Architecture Version 1.0 April 2012 Developed in conjunction with: TABLE OF CONTENTS 1 Document Purpose... 5 2 Document Scope... 5 3 Background...
More informationSOA-20: The Role of Policy Enforcement in SOA Management
SOA-20: The Role of Policy Enforcement in SOA Management Phil Walston VP Product Management Layer 7 Technologies Overview Discuss policy in SOA, the role of Policy Enforcement Points and where this fits
More informationNIEM in Action: Roadmap to Successful Standards- Based Information- Sharing
NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing The National Information Exchange Model (NIEM) A Presentation to the IACP-LIEM Conference May 9, 2008 Nashville, TN Paul Wormeli,
More informationACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families
ACF Interoperability Human Services 2.0 Overview August 2011 David Jenkins Administration for Children and Families Interoperability: An Operational Definition Creating a Health and Human Service System
More informationNational Identity Exchange Federation. Terminology Reference. Version 1.0
National Identity Exchange Federation Terminology Reference Version 1.0 August 18, 2014 Table of Contents 1. INTRODUCTION AND PURPOSE... 2 2. REFERENCES... 2 3. BASIC NIEF TERMS AND DEFINITIONS... 5 4.
More informationFEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION
FEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION SEARCH MEMBERSHIP MEETING July, 2011St. Louis, Mo. David Gavin Current State of Criminal Justice Information Sharing However beautiful the strategy,
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationInformation Sharing. Topics NATIONAL STANDARDS? WHY DO WE CARE? NATIONAL INFORMATION EXCHANGE MODEL
Information Sharing J ASON H UTCHENS D IRECTOR OF D IVISION P LANNING AND A SSESSMENT, I NDIANA D EPARTMENT OF H OMELAND S ECURITY D ONNA R OY E XECUTIVE D IRECTOR, NIEM E XECUTIVE D IRECTOR OF I NFORMATION
More informationIdentität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist
Identität und Autorisierung als Grundlage für sichere Web-Services Dr. Hannes P. Lubich IT Security Strategist The Web Services Temptation For every $1 spent on software $3 to $5 is spent on integration
More informationScaling Interoperable Trust through a Trustmark Marketplace
Scaling Interoperable Trust through a Marketplace John Wandelt Georgia Tech Research Institute This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department
More informationWhat s a BA to do with Data? Discover and define standard data elements in business terms
What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data
More informationImplementing a Ground Service- Oriented Architecture (SOA) March 28, 2006
Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationTopics on Web Services COMP6017
Topics on Web Services COMP6017 Dr Nicholas Gibbins nmg@ecs.soton.ac.uk 2013-2014 Module Aims Introduce you to service oriented architectures Introduce you to both traditional and RESTful Web Services
More informationExtending SOA Infrastructure for Semantic Interoperability
Extending SOA Infrastructure for Semantic Interoperability Wen Zhu wzhu@alionscience.com ITEA System of Systems Conference 26 Jan 2006 www.alionscience.com/semantic Agenda Background Semantic Mediation
More informationGoal: Offer practical information to help the architecture evaluation of an SOA system. Evaluating a Service-Oriented Architecture
Evaluating a Service-Oriented Architecture Paulo Merson, SEI with Phil Bianco, SEI Rick Kotermanski, Summa Technologies May 2007 Goal: Offer practical information to help the architecture evaluation of
More informationWeb Services. Lecture I. Valdas Rapševičius. Vilnius University Faculty of Mathematics and Informatics
Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2014.02.28 2014.02.28 Valdas Rapševičius. Java Technologies 1 Outline Introduction to SOA SOA Concepts:
More informationJOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION
JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION PRESENTED BY: Leon Frederick, CIO, Iowa Department of Public Safety Liz Pearson, URL Integration PRESENTATION OVERVIEW What is N-DEx? What is Iowa
More informationModule B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8
Informs the capability Ensures Realization of Business Vision Business needs feed into method Refines Understanding Informs the Business of the current state Sets targets, KPIs, budgets for architecture
More informationInteragency Advisory Board Meeting Agenda, August 25, 2009
Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and
More informationIdentity and capability management and federation
Identity and capability management and federation The need to manage identities - 1 Increment of digital identity complexity Password, dynamic password, one-time password, based on portable secure devices
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications
More informationAn Overview of TOGAF Version 9.1
An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6
More informationEnterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape
Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary
More informationQuality - The Key to Successful SOA. Charitha Kankanamge WSO2 February 2011
Quality - The Key to Successful SOA Charitha Kankanamge WSO2 February 2011 WSO2 Founded in 2005 by acknowledged leaders in XML, Web Services Technologies & Standards and Open Source Producing entire middleware
More informationKerberos for the Web Current State and Leverage Points
Kerberos for the Web Current State and Leverage Points Executive Advisory Board Meeting and Financial Services Security Summit New York, 3-4 November 2008. Towards Kerberizing Web Identity and Services
More informationWorkshop on Web of Services for Enterprise Computing
Workshop on Web of Services for Enterprise Computing Fujitsu Submission v0.2 Authors: Jacques Durand Tom Rutt Hamid BenMalek Acknowledgements: Masahiko Narita Paul A. Knapp 1. The Great Divide The fundamental
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More information1. Introduction. 2. Technology concepts
1 Table of Contents 1. Introduction...2 2. Technology Concepts...3 2.1. Sharding...4 2.2. Service Oriented Data Architecture...4 2.3. Aspect Oriented Programming...4 3. Technology/Platform-Specific Features...5
More informationServices Oriented Architecture and the Enterprise Services Bus
IBM Software Group Services Oriented Architecture and the Enterprise Services Bus The next step to an on demand business Geoff Hambrick Distinguished Engineer, ISSW Enablement Team ghambric@us.ibm.com
More informationA RESTful Approach to Identity-based Web Services
A RESTful Approach to Identity-based Web Services Marc J. Hadley Hubert A. Le Van Gong Sun Microsystems, Inc. 1 Outline > Identity-based web services intro > RESTful ID-WSF > OAuth Extensions > Permissioned
More informationDHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI
DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI Department of Computer Science and Engineering IT6801 - SERVICE ORIENTED ARCHITECTURE Anna University 2 & 16 Mark Questions & Answers Year / Semester: IV /
More informationWebSphere Application Server, Version 5. What s New?
WebSphere Application Server, Version 5 What s New? 1 WebSphere Application Server, V5 represents a continuation of the evolution to a single, integrated, cost effective, Web services-enabled, J2EE server
More informationEnterprise Architecture Deployment Options. Mark Causley Sandy Milliken Sue Martin
Enterprise Architecture Deployment Options Mark Causley Sandy Milliken Sue Martin GIS is Being Implemented in Many Settings Organization Business to Business Department Workgroup GIS is Moving to the Enterprise
More informationNovell Access Manager 3.1
Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete
More informationDictionary Driven Exchange Content Assembly Blueprints
Dictionary Driven Exchange Content Assembly Blueprints Concepts, Procedures and Techniques (CAM Content Assembly Mechanism Specification) Author: David RR Webber Chair OASIS CAM TC January, 2010 http://www.oasis-open.org/committees/cam
More informationSTANDARDS. JTC Meeting July 14, 2013
STANDARDS JTC Meeting July 14, 2013 Standards Topics I. Propose Jury Standards II. Global Specifications and Pilots III. Electronic Court Filing (ECF) IV. Court Technology Framework (CTF) V. Next-Gen Standards
More informationNational Information Exchange Model (NIEM):
National Information Exchange Model (NIEM): DoD Adoption and Implications for C2 D r. S c o t t R e n n e r Presented at 19th International Command and Control Research and Technology Symposium (ICCRTS)
More informationProposed Revisions to ebxml Technical Architecture Specification v ebxml Business Process Project Team
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Proposed Revisions to ebxml Technical Architecture Specification v1.0.4 ebxml Business Process Project Team 11
More informationAIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0
z/tpf V1.1 TPF Users Group - Spring 2009 Security Considerations in a Service Oriented Architecture (SOA) Jason Keenaghan Main Tent AIM Enterprise Platform Software IBM z/transaction Processing Facility
More informationService Interface Design RSVZ / INASTI 12 July 2006
Architectural Guidelines Service Interface Design RSVZ / INASTI 12 July 2006 Agenda > Mandatory standards > Web Service Styles and Usages > Service interface design > Service versioning > Securing Web
More informationISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems
ISACA Silicon Valley APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems Why Should You Care About APIs? Because cloud and mobile computing are built
More informationWeb Services. Lecture I. Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics
Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2015.02.19 Outline Introduction to SOA SOA Concepts: Services Loose Coupling Infrastructure SOA Layers
More informationHawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011
Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationOG The Open Group OG TOGAF 9 Combined Part 1 and Part 2
The Open Group OG0-093 TOGAF 9 Combined Part 1 and Part 2 1 Set1, Part 1 QUESTION: 1 Which of the following TOGAF components was created to enable architects to design architectures addressing Boundaryless
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationIdentity-Enabled Web Services
Identity-Enabled s Standards-based identity for 2.0 today Overview s are emerging as the preeminent method for program-toprogram communication across corporate networks as well as the Internet. Securing
More informationSmarter Business Agility with WebSphere DataPower Appliances Introduction
Mike Masterson Worldwide Executive WebSphere Appliances 14 October 2010 Smarter Business Agility with WebSphere DataPower Appliances Introduction Smarter Business Agility with WebSphere DataPower Appliances
More informationNext-Generation SOA Infrastructure. An Oracle White Paper May 2007
Next-Generation SOA Infrastructure An Oracle White Paper May 2007 Next-Generation SOA Infrastructure INTRODUCTION Today, developers are faced with a bewildering array of technologies for developing Web
More information1Z Oracle IT Architecture SOA 2013 Essentials Exam Summary Syllabus Questions
1Z0-475 Oracle IT Architecture SOA 2013 Essentials Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-475 Exam on Oracle IT Architecture SOA 2013 Essentials 2 Oracle 1Z0-475 Certification
More informationInformation Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV
Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf
More informationWEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices
WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices Chris Steel, Ramesh Nagappan, Ray Lai www.coresecuritypatterns.com February 16, 2005 15:25 16:35
More informationOffice for Interoperability and Compatibility Emergency Interoperable Standards Efforts
Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts 8th Annual Technologies for Critical Incident Preparedness Conference and Exposition Chip Hines Director, Office
More informationNational Data Sharing and Accessibility Policy-2012 (NDSAP-2012)
National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) Department of Science & Technology Ministry of science & Technology Government of India Government of India Ministry of Science & Technology
More informationRegional TSM&O Vision and ITS Architecture Update
Regional TSM&O Vision and ITS Architecture Update Progress Update Transportation Coordinating Committee April 5, 2019 Task List (2018 2020) 1. Develop a Regional TSM&O Vision 2. Document Current TSM&O
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationOATH : An Initiative for Open AuTHentication
OATH : An Initiative for Open AuTHentication Who Are You Really Doing Business With? 2 Oath Proprietary Confidential The New York Magazine, July 5, 1993, Peter Steiner, The Economic Promise of e-business
More informationThe Business of Identity: Business Drivers and Use Cases of Identity Web Services
The Business of Identity: Business Drivers and Use Cases of Identity Web Services Roger Sullivan, Vice President, Liberty Alliance Vice President, Oracle Corporation Liberty s Architecture Liberty Identity
More information(9A05803) WEB SERVICES (ELECTIVE - III)
1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available
More informationSimplifying Federation Management with the Federation Router
Technical White Paper Simplifying Federation Management with the Federation Router HP Select Federation By: Jason L Rouault Introduction... 2 What is federation... 2 How does federation work... 3 Federation
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More information21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation
21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.
More informationProposed Revisions to ebxml Technical. Architecture Specification v1.04
Proposed Revisions to ebxml Technical Architecture Specification v1.04 Business Process Team 11 May 2001 (This document is the non-normative version formatted for printing, July 2001) Copyright UN/CEFACT
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationIntegration With the Business Modeler
Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design
More informationActiveVOS Technologies
ActiveVOS Technologies ActiveVOS Technologies ActiveVOS provides a revolutionary way to build, run, manage, and maintain your business applications ActiveVOS is a modern SOA stack designed from the top
More informationFHA Federal Health Information Model (FHIM) Information Modeling Process Guide
Office of the National Coordinator for Health IT Federal Health Architecture Program Management Office FHA Federal Health Information Model (FHIM) Information Modeling Process Guide Version 0.1 Draft,
More informationLesson 13 Securing Web Services (WS-Security, SAML)
Lesson 13 Securing Web Services (WS-Security, SAML) Service Oriented Architectures Module 2 - WS Security Unit 1 Auxiliary Protocols Ernesto Damiani Università di Milano element This element
More informationComments submitted at: ange+framework
The Honorable Donald Rucker, MD, National Coordinator for Health Information Technology, US Department of Health and Human Services 200 Independence Ave. SW Washington, DC, 20201 Comments submitted at:
More informationExpose Existing z Systems Assets as APIs to extend your Customer Reach
Expose Existing z Systems Assets as APIs to extend your Customer Reach Unlocking mainframe assets for mobile and cloud applications Asit Dan z Services API Management, Chief Architect asit@us.ibm.com Insert
More informationMicrosoft White Paper
Microsoft White Paper Transforming the Criminal Justice Enterprise: Technology Best Practices Prepared for Criminal Justice Practitioners and CIO s December 20, 2011 Authors: Timothy Galante Brian Mattson,
More informationSentinet for BizTalk Server VERSION 2.2
for BizTalk Server VERSION 2.2 for BizTalk Server 1 Contents Introduction... 2 SOA Repository... 2 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring, Recording
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationTrustworthy user authentication, authorization, data integrity AND consent management
RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY
More informationCollaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014
Collaboration Trail - how Corrections information is shared CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Agenda Introductions Why Collaborate? Along the Collaboration Trail
More informationCA SiteMinder Federation
CA SiteMinder Federation Partnership Federation Guide 12.52 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University
Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationData Partnerships to Improve Health Frequently Asked Questions. Glossary...9
FAQ s Data Partnerships to Improve Health Frequently Asked Questions BENEFITS OF PARTICIPATING... 1 USING THE NETWORK.... 2 SECURING THE DATA AND NETWORK.... 3 PROTECTING PRIVACY.... 4 CREATING METADATA...
More informationStrong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell
Strong Customer Authentication and common and secure communication under PSD2 PSD2 in a nutshell Summary On August 12, the EBA has issued the long-awaited draft of the Regulatory Technical Standards (RTS)
More informationRamnish Singh IT Advisor Microsoft Corporation Session Code:
Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing
More informationASEAN e-authentication Workshop Balwinder Sahota
ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation
More informationService-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA) SOA is a software architecture in which reusable services are deployed into application servers and then consumed by clients in different applications or business processes.
More informationFIBO Operational Ontologies Briefing for the Object Management Group
FIBO Operational Ontologies Briefing for the Object Management Group March 20, 2013, Reston, VA David Newman Strategic Planning Manager, Senior Vice President, Enterprise Architecture Chair, Semantic Technology
More informationebusiness Suite goes SOA
ebusiness Suite goes SOA Ulrich Janke Oracle Consulting Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationDATA Act Information Model Schema (DAIMS) Architecture. U.S. Department of the Treasury
DATA Act Information Model Schema (DAIMS) Architecture U.S. Department of the Treasury September 22, 2017 Table of Contents 1. Introduction... 1 2. Conceptual Information Model... 2 3. Metadata... 4 4.
More informationLeverage SOA for increased business flexibility What, why, how, and when
Leverage SOA for increased business flexibility What, why, how, and when Dr. Bob Sutor Director, IBM WebSphere Product and Market Management sutor@us.ibm.com http://www.ibm.com/developerworks/blogs/dw_blog.jspa?blog=384
More informationAn Overview of ISO/IEC family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
More informationRaytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40
Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release
More informationIdentity Management (IdM) is a crosscutting focus area for DHS
DHS & Identity Management Anil John Telephone: (443) 778-0612 Email: anil.john@jhuapl.edu 1 Identity Management (IdM) is a crosscutting focus area for DHS Enabling Homeland Capabilities EHC #1: Cross-Agency
More informationOASIS BPEL Webinar: Frank Leymann Input
OASIS BPEL Webinar: Frank Leymann Input (OASIS Webinar, March 12th, 2007) Prof. Dr. Frank Leymann Director, Institute of Architecture of Application Systems Former IBM Distinguished Engineer BPEL s Role
More informationThe Emerging Data Lake IT Strategy
The Emerging Data Lake IT Strategy An Evolving Approach for Dealing with Big Data & Changing Environments bit.ly/datalake SPEAKERS: Thomas Kelly, Practice Director Cognizant Technology Solutions Sean Martin,
More informationAccess Control Service Oriented Architecture
http://www.cse.wustl.edu/~jain/cse571-09/ftp/soa/index.html 1 of 13 Access Control Service Oriented Architecture Security Yoon Jae Kim, yj1dreamer AT gmail.com (A project report written under the guidance
More informationThe Identity Web An Overview of XNS and the OASIS XRI TC
The Identity Web An Overview of XNS and the OASIS XRI TC XML WG December 17, 2002 Marc LeMaitre VP Technology Strategy OneName Corporation Goals of this presentation Introduce the idea of the Identity
More information