Information Technology Reference
In-Depth Information
data stores and state. This instance can then be individually served to customers or
organisations.
On the one hand, the B2B gateway acts as an integration point at the edge of the
organisation, supporting the virtualisation and secure exposure of application serv-
ices and enhancing the functionality of these application services, and, on the other
hand, by aggregating infrastructure services to implement common non-functional
aspects. The latter include QoS obligations, identity federation, access and usage
control, etc.
Value-adding services are applications that can be offered as a service over
the network and that have as a primary function the support of new application
virtualization within different collaborations or contexts. Typically VAS services
address critical technical areas that are difficult to achieve for a given organisation
for lack of investment, time, know-how, or due to corporate strategies (McAfee
2006). VAS services include identity services, access control services, policy
servers, security monitors, SLA evaluators, and so on. In this experiment, the key
focus was on security (identity management and bridging, access control, secure
policy enforcement) and SLA (SLA monitor, SLA evaluator, SLA-based service
selection). Another important VAS is that of the governance gateway which offers
the ability to manage business services, infrastructure profiles and full policy life-
cycle management during the collaboration lifetime. Other VAS include presence
or telephony services e.g. VoIP. An overview of the VAS used in this experiment
is given in sections 12.2.1.3 and 12.2.1.4. In addition, we encourage the readers
to refer to Gaeta et al. (2008), D'Andria et al. (2008), Brossard et al. (2008) and
Dimitrakos et al. (2009a).
The Virtual Organisation Management Service (VOMS) contains a set of serv-
ices used in the setup of collaborations between different organisations. Typically
an organisation will identify a business opportunity and key requirements and
technical needs (be it hosting, security, or more complex needs e.g. business proc-
esses).
The figure above illustrates the static architectural view of a typical deployment
of the entire VHE with several partners as per the scenario elicited in section 12.1.5.
Each key component that constitutes the VHE is illustrated: The VOM services are
split among partners and the VHE provider. The hosting environments are provided
- as per the scenario - by Sunny and Saygah. The game to be run is in Sunny's and
Saygah's service pool and will be deployed on their hosting environments. Andago
contains its own game web portal which will expose the gaming management inter-
face and user control pane to its end users, the gamers.
In this scenario, the security VAS are provided by CHOIR and BEMOL
Security. ARPEGGIO provides the SLA services that will monitor the QoS during
the delivery of the services to the end user.
Search WWH ::




Custom Search