310 likes | 429 Views
Service-Oriented Information Sharing: Leveraging the FEA Data Reference Model (DRM) 2.0. Joseph M. Chiusano Booz Allen Hamilton. SOA for E-Government Conference McLean, VA May 24, 2006. Table of Contents. The Information Sharing Challenge What is “Service-Oriented Information Sharing”?
E N D
Service-Oriented Information Sharing: Leveraging the FEA Data Reference Model (DRM) 2.0 Joseph M. Chiusano Booz Allen Hamilton SOA for E-Government Conference McLean, VA May 24, 2006
Table of Contents • The Information Sharing Challenge • What is “Service-Oriented Information Sharing”? • Introduction to FEA Data Reference Model (DRM) 2.0 • How DRM 2.0 Facilitates Service-Oriented Information Sharing • Questions
Table of Contents • The Information Sharing Challenge • What is “Service-Oriented Information Sharing”? • Introduction to FEA Data Reference Model (DRM) 2.0 • How DRM 2.0 Facilitates Service-Oriented Information Sharing • Questions
Information Sharing is not a means in itself, it is one mechanism to help ensure mission success What is information sharing? • Information sharing is more than data exchange—it represents a means to achieve the organization’s mission • Information sharing is about migrating from a ‘need-to-know’ mindset—however it’s not clear that a ubiquitous ‘need-to-share’ environment can be realized due to legitimate societal, political, and legal reasons not to share information • Information sharing is not necessarily a new problem driven by new threats—in fact, what’s new are the characteristics of the information being shared • Information sharing is about creating and sustaining existing or new working relationships that promote information sharing—for example, the integrated Information Sharing Environment that facilitates the sharing of terrorism information • Information sharing reflects the need to address the changing threat environment, the realities of shared missions that defy traditional definitions and jurisdictions, and the evolving nature of information itself It is also critical that the sharing of information be balanced with protecting the privacy and/or civil liberties of all Americans
Government leaders across all branches of government are discussing the benefits and challenges of information sharing “In our digital age, law enforcement officers at every level must be able to make timely and effective use of records and reports from sister agencies - otherwise, we fight crime and terrorism wearing blinders.” Deputy Attorney General James B. Comey, Department of Justice (DoJ), 8/12/2005 "The holy grail of information sharing is the ability to move any piece of information, anytime, to anyone—and do so securely and cheaply." Daniel G. Wolf, Director of the Information Assurance (IA) Directorate at the National Security Agency (NSA), 1/28/06 “Information-sharing works only when both parties demonstrate value or benefits that outweigh the risk of sharing and losing control over your information.” Michael Assante, former US Navy intelligence officer, 7/01/05
Environment Rules Supporting Capabilities Trusted Relationships Incentives Reduce the effect of need-to-know cultures, which not only prevent sharing but do not allow experts and analysts at the “edge” to have the information they need to begin to ask the rightquestionsand make the right decisions Recognize that information sharing occurs in both vertical andhorizontaldimensions, linking analysts to decision-makers, all levels of government, and the public and private sectors Recognize that information sharing within and external to an organization – including across Federal, State, local, and private entities – often need to overcome antiquated legal and policy obstacles Create adistributed, decentralized, and trustedinformation network Update agency incentive structures, which directly oppose information sharing, so that they lower the risks(criminal, civil, internal administrative penalties) and increase the rewards of sharing Various entities have produced a remarkably consistent set of findings and recommendations, reinforcing the validity and priority of solving the information sharing problem • “Ultimately, what is required is an ‘enduring institutional change to address our current threat environment’” • Weapons of Mass Destruction Commission
Numerous challenges and solution factors across the critical building blocks demand a right-sized, tailored approach for successful information sharing Today’s focus
Table of Contents • The Information Sharing Challenge • What is “Service-Oriented Information Sharing”? • Introduction to FEA Data Reference Model (DRM) 2.0 • How DRM 2.0 Facilitates Service-Oriented Information Sharing • Questions
What is “Service-Oriented Information Sharing”? • Service-Oriented Information Sharing is an approach to electronic information sharing, based on Service-Oriented Architecture (SOA) principles, involving the provisioning of data services (and the services that support them), for the purpose of providing agile and scalable access to information in a timely and efficient manner • Data services provide access to data and data sources, typically for a specific type of data • Example: A “Criminal Incidents” data service that provides information regarding criminal incidents aggregated from among multiple data sources between states/provinces of a country, further analyzed using business intelligence (BI) to look for patterns/trends among the data (e.g. similarities between victims) • Technologies such as Enterprise Information Integration (EII) are often used to enable such capabilities, often known as “federated queries” • Data services may leverage supporting services, such as: • Security services: Authenticate and authorize the data service to data sources as well as other services • Discovery services: Dynamically discover WSDL descriptions for Web service-accessible data sources (i.e. other data services) • Semantic Mediation services: Bridge semantic inconsistencies (also known as “semantic conflicts”) between controlled vocabularies of data sources
COIs are collaborative groups of users who must exchange information in pursuit of their shared interests, missions, or business processes and who have a shared vocabulary for the exchanged information (Net-Centric Data Strategy). Time Sensitive Targeting Programs Key COI Attributes: Blue Force Tracking Programs • Formed to solve a mission need • Actively support information sharing (e.g. information visibility and accessibility) • Composed of all appropriate stakeholders (i.e. end-users, developers, data owners/producers, architects, project managers) • Work to define and post their agreed-on vocabulary Payroll Programs Various DoD Programs “Data consumers” and “data providers” are often part of the same or different Communities of Interest (COIs)
There are three primary requirements that are inherent in Service-Oriented Information Sharing • Agility: The ability to quickly and efficiently discover, reposition, and integrate information assets in response to strategic decisions, changing business climate, and unanticipated events • Example: On-the-fly integration of data sources in response to a terrorist incident or natural disaster • Scalability: The ability to efficiently add new functionality, new information sharing partners, and new information sources to an information sharing environment • Example: New subject area becomes relevant (or suddenly critical) within an established information sharing environment • Reach: The ability to share information outside one’s own organizational boundaries to the widest degree possible, to support and achieve information sharing mission goals • Example: Sudden need to exchange information with international entities to support an incident investigation These requirements are satisfied by SOA principles such as location and processing transparency, open standards, vendor- and platform-neutrality, and more
Service-Oriented Information Sharing Suitability Spectrum Low High Database-to- Database Transfer EDI Enterprise Data Warehouse (EDW) Shared Spaces Enterprise Portals Publish/ Subscribe Data Services There are numerous techniques/technologies that can enable information sharing, which we may place on a Service-Oriented Information Sharing “Suitability Spectrum” • Database-to-Database Transfer: Direct transfer of information from one database to another • Electronic Data Interchange (EDI): An electronic information exchange standard involving the transfer of positional files between trading partners, often using Value Added Network (VAN) services • Enterprise Data Warehouse (EDW): An enterprise-level repository of integrated information covering multiple subject areas that is primarily used for query and analysis purposes • Shared Spaces: A technique in which data providers make information available in common (“shared”) spaces (such as a database), from which data consumers may subsequently retrieve the information • Enterprise Portals: Web sites that act as electronic “gateways” to information and services within or outside an organization • Publish/Subscribe: A technique in which data consumers “subscribe” to data (topic-based, source-based, etc.) and are automatically notified upon its availability, as well as upon updates • Data Services: See earlier
Each technique/technology has advantages and disadvantages by which its suitability can be determined *assume equal weight for each capability
Each technique/technology has advantages and disadvantages by which its suitability can be determined (cont’d) We will now focus on Data Services, and their role in Service-Oriented Information Sharing as specified in the FEA Data Reference Model (DRM) 2.0
Table of Contents • The Information Sharing Challenge • What is “Service-Oriented Information Sharing”? • Introduction to FEA Data Reference Model (DRM) 2.0 • How DRM 2.0 Facilitates Service-Oriented Information Sharing • Questions
The FEA Data Reference Model (DRM) is a framework to enable information sharing and reuse across the federal government • The DRM enables information sharing and reuse via the standard description and discovery of common data and the promotion of uniform data management practices • The DRM provides a common mechanism to enable data interoperability, harmonization and standardization across the federal government • The DRM also provides guidance to enterprise architects and data architects for helping to increase agency agility in drawing out the value of information as a strategic mission asset • The DRM enables us to begin to address key questions such as the following: • How do agencies discover what data are available for sharing and re-use? • How do agencies make such data visible and accessible? • How do agencies ensure that procedures for security and appropriate use of the data shared are considered and followed? • How do agencies reduce unnecessary redundancies in the collection and storage of data? • How do agencies drive down IT system costs by effectively managing data? • How does the Federal government create rapid information sharing in responding to a time sensitive event or crisis? (most important key question!)
DRM History and Timelines • The original DRM Overview was released in October 2004 • It is known as “The Data Reference Model Volume I, Version 1.0” • Work began on the DRM 2.0 initiative in February 2005 • Initiative sponsored by the Office of Management and Budget (OMB) and the Federal Chief Information Officer (CIO) Council • DRM Working Group was comprised of 30 agencies (124 representatives) • Public site: http://colab.cim3.net/cgi-bin/wiki.pl?DataReferenceModel • DRM 2.0 was finalized by OMB in December 2005 • See http://www.whitehouse.gov/omb/egov/documents/DRM_2_0_Final.pdf • The DRM Management Strategy in the process of being updated • Release anticipated later this year • DRM 2.0 was presented to Congress in December 2005 as a supporting mechanism for the requirements of Section 207d of the E-Gov Act • See OMB Memorandum M-06-02 “Improving Public Access to and Dissemination of Government Information and Using the Federal Enterprise Architecture Data Reference Model”
Concrete Architecture Concrete Architecture Enhanced interoperability Reference Model (DRM) The DRM is presented as an abstract framework from which “concrete architectures” may be derived • The DRM’s abstract nature will enable agencies to use multiple approaches, methodologies and technologies while remaining consistent with the foundational principles of the DRM • By associating elements of concrete architectures with the DRM abstract model, those elements may therefore be associated with each other, which can help promote interoperability between cross-agency architectures/implementations • Thus, the abstract nature of the DRM as a reference model provides tremendous implementation flexibility
Data Sharing Query Points and Exchange Packages Data Description Data Context Taxonomies Data and Data Assets DRM 2.0’s three “standardization areas” represent the various aspects of data that the DRM addresses • They are shown below: • The arrangement of the standardization areas in the above figure indicates how: • Data Sharing is supported by the capabilities provided by the Data Description and Data Context standardization areas, and • Data Description and Data Context capabilities are mutually supportive Source: DRM 2.0
The Data Description standardization area provides a means to uniformly capture the semantic and syntactic structure of data • Data Description enables mission-critical capabilities such as: • Data Discovery: • The capability to quickly and accurately identify and find data that supports mission requirements • Data Reuse: • The capability to increase utilization of data in new and synergistic ways in order to innovatively and creatively support missions • Data Sharing/Exchange: • Theidentification of data for sharing and exchange within and between agencies and COIs, including international, state, local and tribal governments, as appropriate • Data Entity Harmonization: • An enhanced capability to compare data artifacts across government through a common, well-defined model that supports the harmonization of those artifacts and the creation of “common entities”
The Data Context standardization area facilitates discovery of data through an approach to the categorization of data according to taxonomies • Its purpose is to enable identification and discovery of data, data artifacts, and data assets, and to provide linkages to the other FEA reference models which are themselves taxonomies • Data context: Any information that provides additional meaning to data to relate it to the purposes for which it was created and used • DRM 1.0 specified the FEA Business Reference Model (BRM) as the foundation for Data Context • DRM 2.0 enables specification of context according to any taxonomy • Can specify context according to FEA reference models (e.g. BRM), authoritative taxonomies, agency-specific taxonomies, etc.
Simple illustration of Data Context: File system folder The directory in which the “Agenda.doc” file resides provides its context
The Data Sharing standardization area supports the access and exchange of data • Where: • Access consists of ad-hoc requests • Example: Query of a Data Asset • Exchange consists of fixed, re-occurring transactions between parties • Example: Regular exchange of environmental testing data among federal, state, local, and tribal entities • The Data Sharing standardization area is supported by the Data Description and Data Context standardization areas in the following ways: • Data Description: Robust description of data provides enhanced meaning, which further enables determination of whether that data is pertinent for sharing • Data Context: Categorization of data facilitates its discovery, which is a prerequisite for sharing
The scope of the DRM is broad, as it may be applied within a single agency, within a Community of Interest (COI), or cross-COI COI #1 COI #2 Agency Agency COI #3 Agency Agency DRM 2.0 Agency Agency Agency-specific DRM 2.0 implementation COI-specific DRM 2.0 implementation Agency
Table of Contents • The Information Sharing Challenge • What is “Service-Oriented Information Sharing”? • Introduction to FEA Data Reference Model (DRM) 2.0 • How DRM 2.0 Facilitates Service-Oriented Information Sharing • Questions
DRM 2.0 facilitates Service-Oriented Information Sharing primarily through its Data Sharing standardization area Data exchange topics (subject areas) Data supplier Data exchange requirements (Description, policies, contracts) Message payload requirements Data consumer Data Sharing section of DRM 2.0 Abstract Model Source of base graphic: DRM 2.0 Query “broker”
Data Schema The Data Sharing standardization area is supported by the Description and Data Context standardization areas Data Description section of DRM 2.0 Abstract Model: Data Context section of DRM 2.0 Abstract Model: FEA reference model associations Service categorization (Discovery) Data source(s) queried Documents shared (Message payload) Service data model (Description, semantics) Source of base graphics: DRM 2.0
DRM 2.0 describes various data services that can provide information sharing capabilities
DRM 2.0 describes various data services that can provide information sharing capabilities (cont’d) Further definition of these data services is left to reference architectures and future DRM phases
Table of Contents • The Information Sharing Challenge • What is “Service-Oriented Information Sharing”? • Introduction to FEA Data Reference Model (DRM) 2.0 • How DRM 2.0 Can Facilitate Service-Oriented Information Sharing • Questions
Contact Information • Joseph M. Chiusano • Booz Allen Hamilton • Washington, DC • (202) 508-6514 • chiusano_joseph@bah.com