Contracts, SLAs and Virtual Enterprises Carlos Molina-Jimenez ( Meeting of TAPAS partners at University.

Slides:



Advertisements
Similar presentations
Audit. Types Scheduled Audits Programmatic Assurance >Field Monitoring, Annual Reviews Reviews of Partners Financial Records > Spot Checks > Special Audits.
Advertisements

©2003, Karl Aberer, EPFL, School of Computer and Communication Sciences Some Requirements for Semantic Web Serivce from CROSSFLOW and OPELIX Karl Aberer.
The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Document Exchange Product Overview Secure Transmission for Transaction-based Documents.
1 Eurostat Unit B1 – IT Systems for Statistical Production IT outsourcing in Eurostat – our experience Georges Pongas, Adam Wroński Meeting on the Management.
Contracts, Service Level Agreements and Virtual Enterprises in Composite Services Carlos Molina-Jimenez (
Developing harmonious, stable and progressive industrial relations: THE ROLE OF THE VIETNAMESE TRADE UNION MOVEMENT PhD Candidate DONG THI THUONG HIEN.
1 © Wolfgang Emmerich, 2002 UCL Wolfgang Emmerich.
TAPASDelivMarch04 1 TAPAS Deliverables for March 04 (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University.
Eugen Volk High Performance Computing Center – HLRS University Stuttgart AgroGrid Composition and Monitoring of dynamic Supply Chains.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Lecture 1 Introduction to the ABAP Workbench
Secure Electronic Data Communications and Transactions.
Introduction to Intellectual Property using the Federal Acquisitions Regulations (FAR) To talk about intellectual property in government contracting, we.
Trusted Coordination ADAPT Workshop, December 03 1 Building Blocks for Trusted Coordination (a status report from the TAPAS project) Santosh Shrivastava.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Security Management.
Confidentiality Agreements at Ryerson … or “if I tell you, I’ll have to kill you!” Heather Gallant, ORS.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
TAPAS WP1 – Application Service Requirements and Specification.
Davide M. Parrilli, ICRI Brussels, 13 January 2009 SLAs in a Grid Environment: The Legal Assessment
Virtual Enterprise Normative Framework within Electronic Institutions Henrique Lopes Cardoso 1,2, Eugénio Oliveira 1
E-Science Meeting April Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
E-Science Meeting March Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
The Determination of Jurisdiction in Grid and Cloud Service Level Agreements GECON 2009, Delft, 24/8/09 Davide M. Parrilli
ELECTRONIC CONVEYANCING WORKSHOPS 2009 Simon Libbis Executive Director Ann Kinnear Operations Manager.
NMED 3850 A Advanced Online Design January 12, 2010 V. Mahadevan.
Slide 1 © 2004 Reactivity The Gap Between Reliability and Security Eric Gravengaard Reactivity.
TAPAS meeting Application Hosting Requirements adesso AG Werner Beckmann
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Computational Business Processes as Software Components for Electronic Commerce Walt Scacchi USC ATRIUM Laboratory
Newcastle upon Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
Cracow Grid Workshop ‘06 17 October 2006 Execution Management and SLA Enforcement in Akogrimo Antonios Litke Antonios Litke, Kleopatra Konstanteli, Vassiliki.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Bologna, September 2003 Giovanna Ferrari School of Computing Science University of Newcastle.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
AN SLA-BASED RESOURCE VIRTUALIZATION APPROACH FOR ON-DEMAND SERVICE PROVISION Gabor Kecskemeti MTA SZTAKI International Workshop on Virtualization Technologies.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. WSLA Language Specification
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 The Virtual Enterprise Model Carlos Molina-Jimenez TAPAS meeting, Dortmund th Feb 2003.
adesso AG 2004 TAPAS IAB meeting 1 TAPAS meeting Evaluation approach for TAPAS adesso AG Werner Beckmann
Introduced some basic knowledge of the contract First, what is the contract? Contract, also known as contract. China's definition of the contract, the.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
1 An abstract model for run-time monitoring and enforcement of contracts. Carlos Molina-Jimenez TAPAS.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Z39.50 A Basic Introduction Kathleen R. Murray, Ph.D. William E. Moen, Ph.D. May 2002.
Consumers, Health, Agriculture and Food Executive Agency 3rd Health Programme The Electronic Submission System (JA 2015) Georgios MARGETIDIS.
Computer Systems Architecture Edited by Original lecture by Ian Sunley Areas: Computer users Basic topics What is a computer?
Building Capacity of SMEs for Participation in Public Procurement Draft Presentation for Training of Trainers June 2014.
Trusted CoordinationTAPAS Workshop, 25-26/09/031 Building Blocks for Trusted Coordination Nick Cook University of Newcastle.
Introduction to the law of treaties Keiichiro Okimoto Associate Legal Officer Treaty Section, Office of Legal Affairs 16 November 2011.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
IAB-Feb 04 1 TAPAS Progress Report (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University.
How the ESign Act Makes Esignatures Work
When BPM meets Blockchain
Vendor Statements of Work: Your Role as an IT Professional
WWW and HTTP King Fahd University of Petroleum & Minerals
INTERCONNECTION GUIDELINES
Fundamentals of business law, 10e
Distribution and components
Step 3: Legally Binding agreements and contracts
NET 311 Information Security
Relate to Clients on a business level
A Distributed Tabling Algorithm for Rule Based Policy Systems
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts
Presentation transcript:

Contracts, SLAs and Virtual Enterprises Carlos Molina-Jimenez ( Meeting of TAPAS partners at University of Newcastle upon Tyne 5-6 th Aug 2002

Useful notation to remember E: Enterprise VE: Virtual Enterprise SLA: Service Level Agreement RO: Rights and Obligations Cli: Client Srv: Server ASP: Application Service Provider

Outline of the presentation Motivation for this presentation What is a virtual enterprise? What is a contract? Contracts in virtual enterprises What is a SLA? Relationship between SLAs and contracts? Conclusions References

Motivation for this presentation Strong relation between contracts, virtual enterprises and server level agreements. Understanding ASP, marketplaces, etc. SLA Contracts and VE

What is a virtual enterprise? -Two or more enterprises -Possibly mutual distrust -Business relationships How is a VE created? Provision of resources to each other: electronic and mechanical components. cars, ships, computers and other machinery. IT, marketing services, etc. Purpose

Efficient provision means sharing Shared resources Private resources Private resources Shared resources E1 E2 VE

Virtual enterprise: logical view Private resources Private resources E1 E2 Shared resources VE

How are disputes prevented? A mechanism to regulate interactions between participating parties is needed. A contract

What is a contract? A contract between Alice (the manager of E1) and Bob (the manager of E2) is: Obligations Alice Rights Bob Rights Obligations Bob AGREEMENT Signatures Manager E1 Manager E2

We did not invent contracts Have been around for ages. Used in different situations. However: Our interest focuses on contracts where the provision of services (resources) heavily depends on the use of computer technology. These contracts have: computational Non- computational

Computational part of contracts We conceive a contract as A script file (with readable text and executable lines) that can be enacted. o Digital signatures, o Cryptography, other computer technology. Focus on enactment monitoring renegotiation of parts. Further research original negotiation dispute resolution (in court) done remotely and automatically from the original script file.

Relevance of contracts in VEs. A contract enactment creates a VE. Obligations Alice Rights Bob Rights Obligations Bob AGREEMENT Signatures Manager E1 Manager E2 Private resources Private resources E1 E2 Shared resources VE enactment

Example of a contract “Alice has the right to retrieve a copy of doc1 from Bob’s enterprise, provided that her request is not submitted on Fri, Sat or Sun. Bob has the obligation to provide doc1 in less than 24 hs.” Rights and obligations: Rights: to request Doc1. Obligations: not to submit requests on weekends Rights: to check that request was submitted on Mon-Thu Obligations: to provide a copy of Doc1 in less than 24 hs. Alice Bob

Contract monitoring architecture check Alice’s ROs check Bob’s ROs check Alice’s ROs Alice’s E1 Bob’s E2 contract monitor request (doc1) reply (doc1) request (doc2) reply (doc2) Cli Srv Cli E-Enterprise, ROs- Rights and Obligations, Cli-Client, Srv-Server

Definition of SLA “A service level agreement defines the responsibilities of a service provider and the user of that service. It also identifies the services provided as well as the supported products, measurement criteria, reporting criteria, and quality standard of the service” [ Beckman and Oleneva,2002]. SLAs are needed where two (or more) enterprises interact: * for ex. between an ASP (Adesso) and a client. ASP (adesso) Client SLA

Accurate definition of SLA Accurate definition of SLA: agreement about some specific QoS of interest to Alice and Bob. defined as a set of named clauses about rights and obligations. RO- Rights and Obligations Alice SLA={R 1,O 1,…R m,O m, } AGREEMENT ABOUTBob For ex. R 1 - Alice has the right to request Doc1. O 1 - Alice has the obligation not to submit a request on weekends. R 2 - Bob has the right to check that the request was submitted on Mon-Thu. etc. Can name can change

Service level agreements and rights and obligations Alice and Bob interaction is defined and regulated by their Rights and Obligations (ROs). ROs can be named and grouped into SLAs: SLA 1 ={R 1,O 1,…R m1,O m1 }, SLA 2 ={R 1,O 1,…R m2,O m2 }, SLA 3 ={R 1,O 1,…R m3,O m3 }, … … …

SLAs and contracts A SLA is not a contract. A contract can be defined in terms of named SLAs : Named SLAs and RO can be: referred, edited, changed. Signatures Manager E1 Manager E2 AGREEMENT SLA 1 ={R 1,O 1,…R m1,O m1 }, SLA 2 ={R 1,O 1,…R m2,O m2 }, SLA 3 ={R 1,O 1,…R m3,O m3 }, … … …

Conclusion We need to specify the interaction between two or more enterprises not in terms of SLAs but in terms of contracts ASP (adesso) Client SLA ASP (adesso) Client enactment of the contract creates a VE

References Toward an e-contract management architecture for inter-organizational interaction in TAPAS … John Warne, 2002

Conclusions (more) No business interaction between two or more enterprises can happen without a contract. A SLA is not contract but can be part of a contract. SLAs list the ROs for a speficic QoS. A contract that precisely lists and names SLAs (and ROs) can be automatically enacted to create a VE. monitored.

Virtual enterprise: physical view Shared resources Private resources Private resources Shared resources E1 E2 VE

Definition of an electronic contract A digitally signed statement of all qualified named entities involved, detailing roles, rights, and obligations for client/server and peer/peer use of services/resources in a Virtual Enterprise (VE).

Contract monitoring architecture check Alice’s RO check Bob’s RO check Alice’s RO Alice’s E1 Bob’s E2 contract monitor request (doc1) reply (doc1) request (doc2) reply (doc2) Cli Srv Cli E-Enterprise, RO- Rights and Obligations, Cli-Client, Srv-Server