Presentation on theme: "GRID Economies Breakout Group 3. Economies What are you selling? Pricing Transaction/access to resource Security attribute (e.g. price drops if security."— Presentation transcript:
Economies What are you selling? Pricing Transaction/access to resource Security attribute (e.g. price drops if security drops) QoS attribute (including proof/auditing – externally certified) Challenge: Dynamic Negotiation
What is the economic model Business Financial motivation – real money Financial motivation – real moneyAcademic Different motivation – different economy of awards Different motivation – different economy of awards Not real money – what comeback for failure to deliver Not real money – what comeback for failure to deliverReputation/Credibility Needs to be measures/assessed Needs to be measures/assessed
Stakeholders/Roles Service Owners Agents Service Brokers Service Brokers Service Aggregators Service Aggregators QoS auditing QoS auditing End users GGF GESA Use Cases Resource Provider Resource Provider Computation Resource Reseller Computation Resource Reseller Application Service Provider Application Service Provider Computation Broker Provider Computation Broker Provider Software License Provider Software License Provider
Hidden Stakeholders/Roles SysAdmin Role Resource Provisioning E.g. UKERNA Role E.g. UKERNA Role E.g. Dynamic QoS/bandwidth booking E.g. Dynamic QoS/bandwidth bookingSpecialists Economist Economist Mechanism for setting prices etc? Lawyers Lawyers System vendors
Trust/Reputation Trust as in identity/security Trust of reliability i.e. Reputation based i.e. Reputation based Brokering causes branching chains of trust How to logically/mathematical calculate security trust through chain (e.g. via CA)?
Policies Managing multiple policies Intersection of visible policies Intersection of visible policies Single common policy language as part of GESA Do we need/Can we have focal/common policy framework? From where? (OFGRID?)
Training How do you train autonomous agents? Training specific to role Training/qualification of intermediaries should be certified? Training vs useable tools Is now right time? (tools liable to change) Yes for SysAdmins Yes for SysAdmins No for end-users No for end-users
Technology Gap Controlling resource allocation Controlled execution of uploaded code and execution validation Monitor/auditing QoS/SLA (but not infringe privacy) Fine grained security which doesnt impact ability to manage systems/problem fix Interdomain policy management Useability of tools/systems by non-SysAdmin
Your consent to our cookies if you continue to use this website.