Uploaded by Al Gough

Describing Authoritative Sources in the BEA

advertisement
Strategy and
Architectural
Representation for
Describing Authoritative
Sources in BEA 4.0
A BTA Net-Centric Team White
Paper
28 February 2006
Call 0011, Task 4.2.4.1
Version 1.0
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
This Page Intentionally Blank
Call 11 - 4.2.4.1
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
0.9
Table of Contents
Table of Contents ........................................................................................................................... i
Index of Tables .............................................................................................................................. ii
Index of Figures............................................................................................................................. ii
1
Introduction ...........................................................................................................................1
1.1
Nature of Problem ..........................................................................................................1
1.2
Objectives for Describing Authoritative Sources ..........................................................1
1.3
Assumptions and Caveats ..............................................................................................2
1.4
Document Organization .................................................................................................3
2
Background ............................................................................................................................5
2.1
Related Directives and Guidance ...................................................................................5
2.2
Key Concept Definitions................................................................................................6
2.3
Supporting Concepts ......................................................................................................6
2.4
Types of Data Sources To Be Addressed by the Authoritative Sources Description
Approach ........................................................................................................................8
3
Examples of Current Authoritative Sources .......................................................................9
3.1
Designated by Law and Regulation ...............................................................................9
3.1.1
Central Contractor Registry ................................................................................9
3.2
Designated by DoD Component ....................................................................................9
3.2.1
Defense Enrollment and Eligibility Reporting System .....................................10
3.2.2
Army Designation of Army Portfolio Management Solution ...........................10
3.2.3
DoD Metadata Registry and Clearinghouse ......................................................11
3.2.4
BEIS for SFIS Library Terms ...........................................................................11
4
Authoritative Source Use Cases .........................................................................................12
4.1
Use Case for Local Contractor Information.................................................................12
4.2
Use Case for Financial Management ...........................................................................13
5
Guidance for Describing Authoritative Sources in the BEA ...........................................15
5.1
Characterization of Sources and Authoritative Sources in the BEA ...........................15
5.2
Metadata for Describing Sources and Authoritative Sources in the BEA ...................16
5.3
Architectural Representation of Sources and Authoritative Sources in the BEA........18
5.4
Examples of Use of the Architectural Representations ...............................................20
6
Guidance for Describing Authoritative Sources for Visibility and Discovery in the NetCentric Environment...........................................................................................................22
6.1
Visibility and Discovery Overview .............................................................................22
6.2
Defense Discovery Metadata Specification Background ............................................23
6.3
Authoritative Source Representation in DDMS ..........................................................24
Call 11 - 4.2.4.1
i
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
6.4
7
1.0
Sharing and Visibility of Authoritative Sources ..........................................................27
6.4.1
Traditional Implementation of Authoritative Sources Approach......................28
6.4.2
Net-Centric—SOA and Web Services – Implementation of Authoritative
Sources Approach .............................................................................................29
Next Steps .............................................................................................................................30
7.1
Updates to BEA ...........................................................................................................30
7.2
Registration of Authoritative Sources in a Net-Centric Environment .........................31
7.3
Related Strategy Work .................................................................................................31
Appendix A – References ......................................................................................................... A-1
Index of Tables
Table 6-1, Authoritative Source Description Table Definition .................................................... 24
Table 6-2, Authoritative Source Category Elements Table .......................................................... 25
Table 6-3, Example of DDMS Authoritative Source metadata .................................................... 26
Table A-1, Reference Documents ............................................................................................... A-1
Index of Figures
Figure 4-1, Authoritative Sources for Contractor Information ..................................................... 12
Figure 4-2, Authoritative Sources for Financial Information ....................................................... 13
Figure 5-1, Sources and Authoritative Source Descriptions at Different Levels of Abstraction . 15
Figure 5-2, Existence of an Authoritative Source Description Identifies a Source as
Authoritative. .......................................................................................................................... 16
Figure 5-3, Initial Architectural Use of Authoritative Source Description. ................................. 18
Figure 5-4, Representation of Sources and Authoritative Sources in the Architecture. ............... 19
Figure 5-5, Example of the Architectural Representation of Source. ........................................... 21
Figure 5-6, Example Architectural Representation of Source as an Authoritative Source. ......... 21
Figure 6-1, Source Discovery in a Net-Centric Environment....................................................... 22
Figure 6-2, DDMS Logical Model................................................................................................ 23
Figure 6-3, DDMS Logical Model Extended to Accommodate Authoritative Sources. .............. 24
Call 11 - 4.2.4.1
ii
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
Acronym
AITR
API
AS
BEA
BEIS
BEP
BMA
BTA
CCR
CES
CFO
CORBA
COI
COM
DBIDS
DBSAE
DCCIS
DCOM
DDMS
DEAMS
DEERS
DFARS
DIMHRS
DNTS
DNVC
DoD
DoDAF
EDI
EJB
ERP
ESB
FACTS
FAR
FASA
FISMA
GFEBS
GIG
GL
HTML
HTTP
IA
IC
Call 11 - 4.2.4.1
Definition
Army Information Technology Registry
Application Program Interface
Authoritative Source
Business Enterprise Architecture
Business Enterprise Information Services
Business Enterprise Priority
Business Mission Area
Business Transformation Agency
Central Contractor Registry
Core Enterprise Services
Chief Financial Officer
Common Object Request Broker Architecture
Community of Interest
Component Object Model
Defense Biometric Identification System
Defense Business Systems Acquisition Executive
Defense Cross-Credentialing Identification System
Distributed Component Object Model
Department of Defense Discovery Metadata Specification
Defense Enterprise Accounting and Management System
Defense Enrollment and Eligibility Reporting System
Defense Federal Acquisition Regulation Supplement
Defense Integrated Military Human Resources System
Defense Non-Combatant Evacuation Operations Tracking System
Defense National Visitors Center
Department of Defense
Department of Defense Architecture Framework
Electronic Data Interchange
Enterprise Java Beans
Enterprise Resource Planning
Enterprise Service Bus
Federal Agencies Centralized Trial-Balance System
Federal Acquisition Regulation
Federal Acquisition Streamlining Act
Federal Information Security Management Act
General Fund Enterprise Business System
Global Information Grid
General Ledger
HyperText Markup Language
HyperText Transfer Protocol
Information Assurance
Intelligence Community
iii
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
IM
IT
JDBC
MOA
MS
NCE
NCOW RM
NEO
ODBC
OMB
OMG
P&R
PIA
PIP
RAPIDS
SFIS
SLA
SOA
SPS
SQL
SRS
UDDI
US
USA
USD
VAN
XML
ZIP
Call 11 - 4.2.4.1
1.0
Information Management
Information Technology
Java DataBase Connectivity
Memorandum of Agreement
Microsoft
Net Centric Environment
Net-Centric Operations and Warfare Reference Model
Non-Combatant Evacuation Operations
Open DataBase Connectivity
Office of Management and Budget
Object Management Group
Personnel and Readiness
Privacy Impact Assessment
Personal Identify Protection
Real-time Automated Personnel Identification System
Standard Financial Information Structure
Service Level Agreement
Service Oriented Architecture
Standard Procurement System
Structured Query Language
Strategic Readiness System
Universal Description, Discovery and Integration
United States
United States of America
Under Secretary of Defense
Value-Added Network
eXtensible Markup Language
Zone Improvement Plan
iv
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1
1.0
Introduction
In pursuit of the net-centric environment in which information consumers can discover and make
use of information to achieve their mission objectives, the DoD Directive 8320.2 Data Sharing
in a Net-Centric Department and the BMA Net-Centric Strategy call for the designation and
description of authoritative sources. Consumers of information need to be able to trust and be
confident in the information available to them. To provide reliable and timely data, the mission
area will identify and designate authoritative sources.
This white paper recommends an approach for describing authoritative sources of data and/or
information in the Business Enterprise Architecture (BEA). Section 5 of this paper sets forth the
recommended approach with Sections 1-4 providing the reader with background and examples
for a better understanding of the topic. Section 6 provides the associated approach for registering
the authoritative sources in a net-centric environment, and Section 7 recommends the next steps
for moving this work forward.
1.1
Nature of Problem
On the surface, the notion of identifying an authoritative source seems straightforward enough.
However, as our research has gone on, we have found numerous complications in this seemingly
simple concept. Data moves in numerous ways from its point of origin, through many processes,
coming to rest in various places with other data flowing in from other processes to meet
important implementation and performance objectives in the real world. Because of this, there
can be many sources for a given piece of information. The notion of trust with regard to such
information grows in complexity as this web of information movement and availability grows
more complex. In addition, there are issues about what, at various levels of abstraction and from
various viewpoints, constitutes a source, and so an authoritative source. An authoritative source
may be an organization, such as the US Postal Service for ZIP codes. The authoritative source
may also be the system or systems through which the Postal Service makes the information
available. Again, it may be specific capabilities, functions or access points provided by the
Postal Service or its systems that are taken to be the authoritative source. To some extent, the
authoritative source is a function of the audience and its particular needs. In the course of this
discussion, we hope to exhibit some of these issues, and show ways to manage and mitigate the
difficulties and complexities that arise.
1.2
Objectives for Describing Authoritative Sources
In order to best guide this white paper, the BTA has defined a set of objectives to be supported
and/or achieved by describing authoritative sources in the BEA. These business transformation
objectives include:
•
Support Information Sharing: Provide programs and initiatives with clear guidance on
sharing information that others need to achieve their mission.
•
Support Visibility of Information: Provide information consumers of the business
community with enough information about sources in order to discover available
information and assess its appropriateness for their task
Call 11 - 4.2.4.1
1
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
•
Support Data Interoperability: Provide programs and initiatives with clear guidance
on the sources for the information they need to achieve their mission—ensuring they
interoperate around appropriate and trusted information.
•
Support Portfolio Management: Provide the BTA Investment Review Boards with
information on trusted and available sources so that portfolio management can take into
account the need to support authoritative sources within the portfolio and to and/or use
the information from authoritative sources. The efforts to designate and describe
authoritative sources can reduce duplicate sources, saving resources and money.
Through supporting these objectives, this approach provides support for the DoD Enterprise
Transition Plan and the ongoing transformation of business processes and systems. Additionally,
programs and initiatives can leverage this work on authoritative sources as they implement in the
net-centric environment. Specifically, the authoritative source descriptions will support:
•
Making Data Visible: This net-centric data goal is supported by the designation of
authoritative sources in the federated architectures and eventually in the registry of
shared data assets.
•
Enabling Data to be Trusted: This net-centric data goal is supported by the description
of the source of information. Consumers of the information can use the descriptive
metadata to assess the appropriateness of the information to their mission.
•
Transitioning to Net-Centricity: Designating and describing authoritative sources is a
step toward the net-centric environment characterized by Service-Oriented
Architectures (SOA), Information Assurance (IA), and data sharing.
Achieving these objectives and representing authoritative sources in the BEA improves the
foundation for BMA transformation initiatives.
1.3
Assumptions and Caveats
In the development of this white paper, we made several assumptions in order to define an
approach that would be applicable for the expected hybrid environment in which systems,
services, and ERPs will co-exist to support the business management of the department. These
assumptions and caveats are:
•
We define an architecture object called ‘service interface’ to be the representation of a
contract between a service provider (e.g., a source) and the consumer of the service (e.g.
information consumer). While there are specific definitions of service interface related
to SOA and Web Services, we are using it in a wider architectural sense in order to
allow for a variety of ways in which access to data, or other functionality, may be
provided including: Web Service, SQL Service (e.g. Oracle ODBC, JDBC), Java
Service, Proprietary API, or other access facility. This interpretation enables the
approach to support the move to a Service-Oriented Architecture, in particular one
based on Web Services, along with existing data access approaches. See the discussions
in the body of the white paper.
Call 11 - 4.2.4.1
2
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
•
For some concepts, such as the notion of partitioning a body of data via its semantic
range, we are presenting the concept, and using just one such partitioning in the
discussion, there will be others. The full extent of these is an open research item.
•
One of the complex issues associated with the concept of authoritative sources revolves
around trust and transitive trust. If a given source cites an authoritative source for a
component of its data offering, and is otherwise trusted, is the trust for the original
authoritative source transitive—transferred to the new source—such that a process can
do “one-stop-shopping” at the new source, thereby not requiring access two sources by
consumers? We will provide further discussion on this topic as background in the next
section, but we have left complete exploration of this topic for further research and
analysis, focusing on the primary sources in this white paper.
•
The concepts of service interface and service instantiation presented here may have key
roles in supporting federation across DoD by providing a well-defined boundary for
component architecture and/or programs and initiatives. These key roles are not further
investigated here as it is outside of the scope of this white paper.
•
This white paper presents an approach for describing and representing authoritative
sources in the architecture. We have not yet addressed the mechanisms or procedures
for stakeholders and Communities of Interest (COIs) to identify which data sources in
the BEA should be designated as authoritative sources of data or information. Per the
Next Steps, the identification of the authoritative sources would follow an adoption of
this approach and would be planned and executed as part of architecture development
for the appropriate architecture release.
1.4
Document Organization
This white paper has the following sections and appendices:
•
Section 1 – Introduction – This section provides the reader with a guide to this white
paper including the purpose and scope, a description of the nature of the problem, the
objectives of describing authoritative sources, and assumptions that the paper makes in
addressing the issues.
•
Section 2 – Background – This section provides the reader with information
underlying the approach set forth in this white paper, and which will help the reader
understand the remainder of the paper. The background includes related guidance from
the department, discussion of supporting concepts, key definitions, and a discussion of
the types of data sources to which this approach is directed.
•
Section 3 – Examples of Current Authoritative Source Designations – This section
shows the reader that some authoritative source designations may already exist through
either law, regulation, or other management assertions. These current designations need
to be accounted for in the guidance to be provided by the white paper.
•
Section 4 – Authoritative Source Use Cases – To aid the understanding of use and
approaches for designating authoritative sources, this section describes use cases for
Call 11 - 4.2.4.1
3
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
authoritative sources. These illustrations demonstrate some of the complexities and
issues uncovered when considering approaches to designating authoritative sources.
•
Section 5 – Guidance for Describing Authoritative Sources in the BEA – This
section presents the reader with a model for thinking about the levels of abstraction
represented in the BEA and with associated specifics to describe authoritative sources at
those levels.
•
Section 6 – Guidance for Describing Authoritative Sources for Visibility and
Discovery in the Net-Centric Environment – This section provides the specifics of
additional metadata representations that will be needed to support the discovery and/or
access of the source through the Core Enterprise Services (CES).
•
Section 7 – Next Steps – This section identifies the next set of steps for testing the
approach presented for describing authoritative sources and the eventual inclusion of
this information in the BEA. This section also includes next steps for registering
authoritative sources in the net-centric environment and related strategy work such as
data interoperability and service oriented architecture (SOA).
•
Appendix A – References – Identifies the documents used or references in this
document.
Call 11 - 4.2.4.1
4
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
2
1.0
Background
This section provides the reader with background and key definitions on which the approach
presented in this white paper is based. The section starts with the related net-centric guidance
and builds to the specific definitions that are important to this approach. We also address the
types of sources that are candidates for being designated as authoritative, and which COIs should
investigate.
2.1
Related Directives and Guidance
This white paper approach has been developed in light of other existing guidance within DoD
that addresses the issue of authoritative sources for information or data.
Relevant information on the topic from these sources is provided in the following quotes:
Information asset owners (e.g., system owners, information producers, information management staff) participate in COIs
identify the authoritative sources information assets. COIs may support information providers in resolving potentially
conflicting sources and, where appropriate, coordinate with the DoD-wide governance bodies to identify authoritative
source(s). The community should provide authoritative source metadata to the NCE, so users and applications can evaluate
and understand the community-implied authority of information assets (see “Discover Information Asset”) to ensure Users
are able to make informed decisions in accessing an information asset. Moreover, Users discovering and identifying a COI
should be able to determine the authoritative information sources controlled or maintained by the Community. This is a subactivity of “Identify Information Assets.”
— From Net-Centric Operations and Warfare Reference Model (NCOW RM) Version 1.1 on
defining authoritative sources
E1.1.2
Authoritative Source. A source of data or information that is recognized by members of a COI to be valid or
trusted because it is considered to be highly reliable or accurate or is from an official publication or reference
(e.g., the United States (U.S.) Postal Service is the official source of U.S. mailing ZIP codes).
4.5.
To enable trust, data assets shall have associated information assurance and security metadata, and an
authoritative source for the data shall be identified when appropriate.
— From DoD Directive 8320.2 Data Sharing in a Net-Centric Department of Defense
C4.5.3.1.
Identify authoritative data sources. When appropriate, the COI should identify data assets that are
authoritative sources for data, and in what contexts the data is authoritative. In situations where there is more
than one authoritative source depending on how the data is used, a COI should indicate the business process
for which the authority is valid.
AP1.1.
Authoritative source implies a data asset that has been determined and defined by a Community of Interest to
be a valid or official source of data. Authoritative sources may vary by COI (e.g., one community may define
an authoritative source for location data to be the US Postal Service and while another community might define
an authoritative source for location data to be an intelligence database). Additionally, a community may define
more than one authoritative source for a particular type of data (e.g., a budget and planning community may
have an authoritative source for budget data for each Military Service)
— From the 8320.2-G Implementation Guide for Department of Defense Directive
8320.2
Call 11 - 4.2.4.1
5
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
2.2
1.0
Key Concept Definitions
The definition of authoritative source we provide here is somewhat wider than definitions
provided in the cited guidance, as we include the cases beyond COI identification to include
sources designated by law or regulation, and so required to be authoritative. COIs may establish
the means by which such laws or regulations are satisfied, but cannot remove the
authoritativeness of the source.
Source (of data or information)
The lowest level and most technical definition for a source is as the interface & mechanism
through which a person or automated process obtains a defined set of information or data (such
as that contained in a data flow or data exchange). This can be as basic as a database
management system’s data access machinery, or as abstracted as a Web Service that makes the
data or information available. As noted in the introduction, at higher levels of abstraction, and
for less specific purposes, a source may be the system function behind such interfaces or
mechanisms, or even just the system itself. At even higher levels, and for non-technical
purposes, the source is the organization or information steward supported by the system, system
functions, and specific mechanisms. Key is that these views of the source of information or data
should all be connected and traceable from the most technical and specific to the most general
conception.
Authoritative Source
The source of data that is designated as the definitive source of the data, whether through law
and regulation, or through enterprise and COI decisions as to what source should be taken as
ground truth (and for what purposes or audiences).
Trusted Schema
Any data source, to be usable, is defined by a schema that makes its data decipherable and
intelligible; the trusted schema for any given source is one that a user obtains from an
authoritative source of such schemas. We expect that such an authoritative source will be the
DoD enterprise catalog of registered data sources—a repository of metadata about data sources
and services
This notion of trusted schemas becomes important in actual implementation, when people need
to connect to sources and authoritative sources in a loosely coupled Net-Centric environment,
and need to trust not only the source, but also how they are to interpret the source through a
definition of the structure of the source information.
2.3
Supporting Concepts
In this white paper, we distinguish between the notion of designating a source as authoritative,
and describing a source as authoritative.
Designation
‘Designation’ refers to the process by which a source of data or information gets its status as
authoritative. For some sources, law or regulation confers this status, and requires them to be the
Call 11 - 4.2.4.1
6
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
authoritative source. For others, the relevant COIs, in particular, the Business Enterprise
Priorities (BEPs) or Core Business Missions (CBMs), may identify from the data sources within
their purview those that they will designate as authoritative, based on the common interests that
form and define the COI.
Description
The description is metadata that provides information about the source or its authoritative status,
captured in the architecture or an appropriate repository. The information can be used by the
information consumer to assess the appropriateness of the information for the task at hand.
Trust – direct and transitive
Any process requiring information as input is dependent upon the reliability of the information
that drives the process. Implementers must be able to trust the source of the data they process in
order to ensure that the results of the process are trusted by the users of the process, including
other processes that are dependent on the subject process for their own activities.
Primary sources of trusted information are what we are calling authoritative sources, as defined
above. Describing these primary Authoritative Sources, defining the basic parameters of the
metadata needed to describe them, and recommending appropriate representations of them in the
architecture and in net-centric service registries and catalogs, is the main focus of this white
paper.
A related concept of source is one that provides information from these primary trusted sources,
and is itself also trusted. Such a secondary source may be a derivative or transitively trusted
source from which to obtain trusted information even though it is not a primary source. It may
bring together information from multiple authoritative sources, so adding value. This secondary
source, by providing the credentials for the pedigree of its information, may itself thereby be
capable of designation as an authoritative source.
Examples of trust, transitive trust and authoritative sources include:
•
A direct trusted authoritative source may be the source for financial detailed
transactions, i.e. the GL transactions in the Army ERP, GFEBS
•
A type of a transitive trusted authoritative source may be the source of summary
financial transactions, i.e., BEIS that is the Corporate General Ledger for DoD where
the financial detailed transactions have been summarized from the direct Authoritative
Source, such as GFEBS.
•
Another type of transitive trusted authoritative source may be where data is cached in a
local database for performance reasons, i.e., Standard Procurement System (SPS) may
copy the Central Contractor Registry data to improve performance in the field or to
support disconnected operations.
The complexities of determining how extensive chains of transitive trust can be, and of
determining appropriate modes of representation and governance, are issues requiring further
Call 11 - 4.2.4.1
7
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
study and analysis. This white paper does not provide specifics on describing them or
representing them in the BEA, but leaves that to a future effort.
2.4
Types of Data Sources To Be Addressed by the Authoritative Sources Description
Approach
The approach presented in this white paper is applicable across sources of many types of data
and information. Below is a listing of different types of data in order to give the reader a sense
of what the approach covers.
•
Operational or Transactional data sources include:
•
•

Data with which the business operates

Sources of transactions and business documents used in the operation of the
business (e.g., Purchase Requests, Contracts)
Business Management data sources include:

Sources of data for tracking the state of business operations

Sources of metrics of business operation

Analytical data sources used for business intelligence and decision-making
Metadata sources include:

Sources that contain data schemas: These are likely to be different sources than
those that provide information in a format compliant with the schemas.

Sources of registry information that serves as metadata about shared data assets,
services, or other objects within the operating environment
It is possible that this approach for describing designating and authoritativeness could be used for
architectural objects in addition to sources that might be so designated. For example, there may
be authoritative algorithms, processes, and services that could be designated authoritative across
the enterprise or some subset thereof.
Call 11 - 4.2.4.1
8
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
3
1.0
Examples of Current Authoritative Sources
Authoritative source designations already exist through either law, regulation, or other
management assertions. This white paper accounts for these current designations in the guidance
it provides. This section describes examples of these existing authoritative sources designations.
3.1
Designated by Law and Regulation
Laws and Regulations may designate authoritative sources. The example discussed in this
subsection is the designation of the Central Contractor Registry as the authoritative repository of
vendors that want to do business with DoD.
3.1.1
Central Contractor Registry
The Central Contractor Registry (CCR) is an example of an authoritative source designated by
regulation.
Why CCR was created:
In the past, any vendor who wanted to do business with more than one DoD site was required to
submit the same business information to each site. This redundancy of paperwork not only
created an administrative burden for both the government and the vendor, but also was a major
source of administrative error and expense in terms of both time and money.
Because DoD is the largest purchaser of good and services in the world, the cost savings to be
incurred by streamlining these administrative processes are dramatic. CCR was created to be the
single repository of vendor data for the entire DoD to avoid this administrative duplication and
allow contractors to take responsibility for the accuracy of their own important business
information by supplying it directly to the government through a single registration.
The CCR Mandate:
In October 1993, the President issued a memorandum that mandated the Government reform its
acquisition processes. Subsequently, the Federal Acquisition Streamlining Act (FASA) of 1994
was passed, requiring the establishment of a "single face to industry." To accomplish this, the
DoD identified a centralized, electronic registration process known as CCR as the single point of
entry for vendors that want to do business with the DoD. To this end, the Defense Federal
Acquisition Regulation Supplement (DFARS), Subpart 204.7300, requires contractors to register
in the CCR to conduct business with the Department of Defense.
Federal Acquisition Regulation (FAR), published March 2005, Section A, Subpart 4.11 states
that “Prospective contractors shall be registered in the CCR database prior to award of a contract
or agreement …”
3.2
Designated by DoD Component
DoD Components and agencies may designate authoritative sources to support their mission
within the department. This subsection will describe these examples of such designations:
Call 11 - 4.2.4.1
9
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
•
Defense Enrollment and Eligibility Reporting System (DEERS),
•
Army Designation of Army Portfolio Management Solution
•
DoD Metadata Registry and Clearinghouse
•
BEIS for SFIS Library values
3.2.1
Defense Enrollment and Eligibility Reporting System
The Defense Enrollment and Eligibility Reporting System (DEERS) is an example of an
authoritative source designated by directive. From DoD Directive 1000.25, “DoD Personnel
Identify Protection (PIP) Program”, published 19 July 2004:
1.2. Establishes policy for the implementation and operation of the DoD
Personnel Identity Protection (PIP) program to include use of authoritative
identity information, issuance and use of DoD identity credentials, and
operation of the Defense Enrollment and Eligibility Reporting System
(DEERS), Real-time Automated Personnel Identification System (RAPIDS)
and associated systems, Defense Biometric Identification System (DBIDS),
Defense Cross-Credentialing Identification System (DCCIS), Defense National
Visitors Center (DNVC), and the Defense Non-Combatant Evacuation (NEO)
Operations Tracking System (DNTS).
4.1.2. Capture uniquely identifying characteristics that bind an individual to
the identity information maintained on that individual in DEERS and to the
identification credentials issued by RAPIDS. These characteristics shall
include, but are not limited to, digital photographs and fingerprints. DEERS
shall be the sole authoritative repository for storing these characteristics.
The DoD Components shall avoid updating and maintaining redundant
repositories without a compelling justification.
5.3. The Director, Defense Manpower Data Center, under the USD(P&R)
shall:
5.3.3. Serve as the authoritative source for identity confirmation.
3.2.2
Army Designation of Army Portfolio Management Solution
The Army Information Technology Registry (AITR) is an example of an authoritative source
designated by a component, in this case the Army.
From the Army Information Technology Registry Instruction Manual, 9 April 2004, which may
be found at http://www.army.mil/aeioo/docs/AITR_Instr_Man_9-Apr-04.pdf:
“The Army Information Technology Registry (AITR) is the Army’s single,
definitive registry of IT systems. The AITR provides data on:

Call 11 - 4.2.4.1
The inventory of Army systems/applications
10
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0

Current status of webification

System milestones for reduction/webification

Tracking of Federal Information Security Management Act (FISMA) data

Privacy Impact Assessment (PIA) data [planned for early 2004]
In addition, it is used to support IM/IT resource management
business/functional process improvement efforts, provide input to the Strategic
Readiness System (SRS), and for compiling information for FISMA status
reports to OMB and Congress. PIA fields will also be included because they
are required by the provisions in OMB Memorandum Guidance for
Implementing the Privacy Provision of the E-Government Act of 2002, dated
September 26, 2002
3.2.3
DoD Metadata Registry and Clearinghouse
The DoD Metadata Registry and Clearinghouse is an example of an authoritative source
designated by a component. It’s web address is http://diides.ncr.disa.mil/xmlreg/user/index.cfm.
XML registries are a vital component in the implementation of shared data
exchanges. Developers looking to express information using XML need
support in establishing common lexicons and grammars. This Registry enables
the consistent use of XML, both vertically within projects and horizontally
across organizations.
The DoD XML Gallery constitutes guidance in the generation and use of XML
among DoD communities of interest and is the authoritative source for
registered XML data and metadata components.
3.2.4
BEIS for SFIS Library Terms
Business Enterprise Information Services (BEIS) is an example of an authoritative source
designated by a component. From the Business Enterprise Information Services (BEIS) Baseline
System Specification, Version 1.0, December 9, 2005:
“SFIS Library Services
BEIS will establish the authoritative source for SFIS data elements for the
entire DoD enterprise. This will be accomplished through the development
and deployment of an SFIS library database structure within the BEIS
environment. This environment will be maintained by data stewards which
have been designated for each of the 62 SFIS Phase 1 data elements.”
Call 11 - 4.2.4.1
11
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
4
1.0
Authoritative Source Use Cases
To aid the understanding of the use and approaches for designating authoritative sources, this
section describes use cases for authoritative sources. These illustrations demonstrate some of the
complexities and issues uncovered in considering approaches to authoritative sources.
4.1
Use Case for Local Contractor Information
While it is required to use contractors that are registered in the Central Contractor Registry, there
are specific exceptions, including “Awards made to foreign vendors for work performed outside
the United States, if it is impractical to obtain CCR registration” 1.
As show in Figure 4-1, there are situations in which local contractor information may be
available from an authoritative source that is not CCR.
Figure 4-1, Authoritative Sources for Contractor Information
Federal Acquisition Regulation, Issued March 2005 by General Services Administration, Department of Defense,
National Aeronautics and Space Administration
1
Call 11 - 4.2.4.1
12
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
The scenario depicted in Figure 4-1 is further described as follows:
•
An Afghanistan installation has an SPS implementation for local use.
•
SPS loads Contractor Data from CCR, the authoritative source, before disconnect.
•
Awards for the use of trucks for transportation needs were given to local contractors for
trucks acquired in Afghanistan.
•
User 1 enters local contractor data into SPS as a contingency contractor, because it is
impractical to expect the contractor in Afghanistan to register in the Central Contractor
Registry.
•
SPS Local Installation is the authoritative source for local contractor data.
The approach for designating authoritative sources must be able to represent that authoritative
contractor data is available from CCR and from the specific installations of SPS.
4.2
Use Case for Financial Management
The To-Be view for financial reporting for DoD is shown in the graphic below, to be provided in
a system name Business Enterprise Information Services (BEIS). Specifically:
•
Financial transactions across the Components are recorded in several applications.
Summaries of the transactions are passed to BEIS as trial balance records.
•
BEIS posts the information to the general ledger.
•
BEIS provides Budgetary Reporting, CFO Financial Statements, and FACTS I & II
reporting to Treasury for the DoD Enterprise.
Figure 4-2, Authoritative Sources for Financial Information
Call 11 - 4.2.4.1
13
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
The Component financial systems and BEIS are authoritative sources for financial and
accounting information. However, their authoritative designations are for specific partitions of
financial information:
•
Component financial management systems are authoritative sources for financial
transactions for a defined scope. For example, Navy ERP is the authoritative source for
financial transactions generated by Navy activity.
•
BEIS is the authoritative source for Budgetary Reporting, CFO Financial Statements,
and FACTS I & II reporting to Treasury.
The approach for designating authoritative sources must be able to represent that authoritative
financial transactions are partitioned across sources and that summary level information and
statements applicable DoD-wide are authoritatively sourced from BEIS.
Call 11 - 4.2.4.1
14
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
5
1.0
Guidance for Describing Authoritative Sources in the BEA
This section presents the reader with the recommendations for describing authoritative sources in
the BEA, based on proposed extensions around the concept of sources in the architecture.
5.1
Characterization of Sources and Authoritative Sources in the BEA
The BEA presents the DoD business architecture at different levels of abstraction, from high to
low. It also produces DoDAF views intended to exhibit various aspects of the architecture from
particular perspectives, such as operational and system that emphasize different characteristics of
the architecture’s elements. The specificity with which a source is identified at a particular level
of abstraction depends on that level of abstraction. At a high level, we may see only large
clumps of data without internal structure. At a lower level, we may see fine-grained definition of
the data contents.
From an operational perspective, the important aspect of a data source may be the organization
that produces it. From a systems perspective, the key characteristic is the system, or at a lower
level, the particular function or service that delivers the information. The notion of a source of
information or data thus has differing representations in the architecture depending on the level
of abstraction and the particular view. Figure 5-1 depicts this graphically.
Figure 5-1, Sources and Authoritative Source Descriptions at Different Levels of Abstraction
Call 11 - 4.2.4.1
15
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
In the architecture, these different representations of a source should be traceable from the
highest level characterization down to that lowest level in the Systems Views. The lowest level
of abstraction of source in the architecture, when it is fleshed out to this level of detail, should
correspond well with the type of net-centric service envisioned in the BMA Net-Centric Strategy,
Version 4.0. as well as in the vision of net-centricity and data sharing found in such DoD NetCentricity publications as DoD Net-Centric Data Strategy, and NCOW RM. In this way, the
architecture can provide clear guidance and a solid foundation for implementation in a netcentric environment.
As noted above in Figure 5-1, the amount and type of metadata needed to characterize a source
as authoritative varies with the view and level of abstraction. The general approach to
identifying data sources in the architecture as authoritative sources is based first on being able to
clearly identify sources in the architecture, and then characterizing appropriate sources as
authoritative with additional metadata. This metadata describes a source with a set of elements
constituting an Authoritative Source Description. The description also uses the identifier of the
source to associate itself with the source, as shown in Figure 5-2. In this way, we can identify
and describe authoritative sources non-invasively—no change is needed to the way in which a
source is described, just this additional set of information. The source description remains the
same whether we ever characterize it as an authoritative source or not.
Figure 5-2, Existence of an Authoritative Source Description Identifies a Source as Authoritative.
5.2
Metadata for Describing Sources and Authoritative Sources in the BEA
The Authoritative Source Description metadata needs to capture information that allows an
information consumer to understand the source, from whence comes its authority, and the
purposes and coverage of the source. Our recommendation in this white paper is that the basic
metadata set include the following items:
•
Designating Authority – The authority that prescribes the source as authoritative; the
locus of the source’s authoritativeness. As a consumer of information from the
authoritative source, the information about the designating authority provides me with a
Call 11 - 4.2.4.1
16
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
pointer to the appropriate organization or policy that I can explore and use for assessing
the appropriateness of the information for my task. Examples of types of designating
authorities include:
•
•

An organization, e.g. General Services Administration, Department Of Defense,
Department of the Navy, and USD (AT&L)

A law, regulation, policy, directive, instruction, or guidance, e.g., DoD Directive
1000.25, “DoD Personnel Identify Protection (PIP) Program”, and “FAR
Subchapter A—General, Subpart 4.11”,

A COI, through its data sharing decision making process, e.g. Financial
Management Community of Interest, Spend Analysis, and Blue Force Tracking
Authority Scope – The purpose and/or audience for which the source is to be taken as
authoritative. There may be a need for more than one authoritative source for
information, not because the information if different, but driven by the need for
different access details or information assurance requirements.

Organization may include, e.g., Congress, DoD, or a particular COI

Purposes can include logistics tracking versus financial accounting when
describing the same objects, or trend analysis and forecasting versus day to day
management control
Semantic Range – The constraints that differentiate an authoritative source based on
semantics, where semantics is taken to be the set of things to which an element or
complex data item may refer. This is akin to domain values in relational database
theory—sets of permissible values. In the near term, such semantics can be used for
partitioning sets of data by its set of valid values. In the longer run, an ontology
representation of semantics, as described in the BMA Net-Centric Strategy Version 4
may provide another and better method of describing semantics and handling this
partitioning. Examples of such partitioning are:

A source may be authoritative only for a specific organization’s data, e.g. Navy
ERP is the authoritative source for financial transactions generated by Navy
activity.

A source may be authoritative for a location.
In this white paper we have focused on partitioning by organization in our examples.
More work on possible partitioning schemes will be driven by the BMA system entities.
•
Data Scope – The set of authoritative data or information that the consumer can get
from the source. The specification of the Data Scope is critical for characterizing each
authoritative source because it tells the information consumer which of the data they
can trust from that source. The Data Scope can be defined in the following ways:
Call 11 - 4.2.4.1
17
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
5.3
1.0

A simple enumerated set of data elements not the data values. The Data Scope
could list “ADDRESS” and “BIRTH_DATE” for a given authoritative source, but
not “1851 Bell St” or “02/13/2000”.

An aggregate (collection of data elements) such as “Travel Request Data” with or
without an associated list or enumeration of data elements, depending on the level
of abstraction or completeness of detail in the associated architectural items

A combination of enumerated data elements and aggregates
Architectural Representation of Sources and Authoritative Sources in the BEA
At the upper levels of abstraction in the architecture, we believe there to be appropriate
representations of sources that can be associated with Authoritative Source Descriptions to
communicate where authoritative sources exist within the architecture. However, at the lowest
level in Systems Views, the notion of source needs further elaboration. This paper recommends
a set of extensions to these lowest levels to better capture the nature of source in support of
eventual net-centric implementations. We provide a depiction of these extensions in Figure 5-4.
However, in the short run, the lowest level in architecture that can be described as a source is the
System/System Function architectural element. Initially, these can be characterized as
authoritative sources, as shown in Figure 5-3. We also show in that figure a schematic
representation of the Authoritative Source Description metadata described earlier in this section.
Figure 5-3, Initial Architectural Use of Authoritative Source Description.
Call 11 - 4.2.4.1
18
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
While identification of Authoritative Sources can be done at this level, as it can at higher levels
of abstraction in the architecture, refinement of the definitions of System Functions in the
architecture, and ultimately, the provision of the Service Interface and Service Instantiation
architectural elements, as shown in Figure 5-4, will yield more precise identification of sources.
These improved definitions will provide better guidance for implementation, and ready support
for making these sources shared and visible in a Net-Centric environment, as described in the
next section of this white paper.
Note that the term ‘service,’ as used here, is that usage found in the concept and discussions of
SOA current in the industry. Like many terms in information technology, it is an overloaded
term. Services can be taken more broadly to mean such things as that one organization provides
a valuable function for another, independent of the mechanisms of such provision. The term is
also already used in other senses than ours in the BEA, and care will be required to ensure that
ambiguity does not arise in communications. Here we are looking at service as indicating a
particular technological solution by which one automated system can make its information and
functionality available to other automated systems in a standard and infrastructure-support way
across a robust network like the GIG.
Figure 5-4, Representation of Sources and Authoritative Sources in the Architecture.
Call 11 - 4.2.4.1
19
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
At this low level of abstraction and high level of specificity in guidance of implementation, we
can see how multiple authoritative sources can exist for a given kind of data, as the architecture
shows multiple systems as implementing a given System Function. This is the motivation for
our inclusion of the Semantic Range as a partitioning of data or information across authoritative
sources. Appropriate use of such partitioning allows distribution of the management of a given
kind of information across multiple implementations while avoiding redundancy and potential
synchronization and control issues.
Service Interface is the specification or definition of a standard interface—a collection of method
or operation signatures that collectively provide access to the information or capabilities of more
system functions. Depending on the granularity of the System Function in the architecture, a
particular System Function may be made available through more than one interface. It is also
possible that a particular interface may provide access to the capabilities of more than one
System Function, to create a unified or controlled access point.
As the architecture comes to show specific systems, it will also show multiple instances of a
System Function through the System/System Function entity. Likewise, there will come to be
multiple implementations or instantiations of Service Interfaces associated with System
Functions, as the realization of the interface for a specific system entity. These are represented
by the proposed Service Instantiation entity. These should be associated with the appropriate
System/System Function elements, and through them, with the correct System Entities. The
instantiation of a Service Interface describes a connection to the real-world source of
information, and represents a service to be implemented and registered and cataloged in a netcentric environment.
It should also be noted that while we here tend to speak of services with an eye to net-centricity
and the emerging DoD SOA environment built around Web Services, our actual intent is to
remain faithful to the broader definition of service we spoke of earlier. We recognize that the
service interface may refer to older modalities of delivering information as well as to Web
Services. One way that a source, and so an authoritative source, can have multiple service
interfaces is through having multiple modalities of delivery of the relevant information in
question. We can imagine that a single source may be able to deliver its information through a
Web Service, an FTP interface, an EDI/VAN interface and perhaps even an email service. This
is an area we have not specifically drilled down into, and which is a good area for further
research.
5.4
Examples of Use of the Architectural Representations
The set of architectural objects includes those that represent both logical descriptions and system
descriptions that are realizations of the logical descriptions. For example, the architecture has a
set of system functions such as “Manage GL”. The architecture also describes System Entities
such as DEAMS that instantiate that functionality for a specific scope. Similarly, the Service
Instantiation extension we recommend is a realization of the recommended Service Interface
extension. Figure 5-5 graphically depicts an example of using this approach:
Call 11 - 4.2.4.1
20
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
Figure 5-5, Example of the Architectural Representation of Source.
In order for this source to be characterized as an authoritative source as this level of the
architecture, it is only necessary that a metadata set describing it as authoritative be created and
populated, including a reference to the specific service instantiation element in the architecture,
as shown in Figure 5-6:
Figure 5-6, Example Architectural Representation of Source as an Authoritative Source.
Call 11 - 4.2.4.1
21
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
6
1.0
Guidance for Describing Authoritative Sources for Visibility and Discovery in the NetCentric Environment
This section provides the reader with guidance on making authoritative sources visible and
sharable through the emerging net-centric mechanisms within DoD. The reader is first provided
a short overview of visibility and discovery using CES. The remainder of Section 6 is a technical
discussion of recommended extensions to the metadata for describing authoritative sources in the
net-centric environment and an example of such a description in text, XML, and HTML.
6.1
Visibility and Discovery Overview
During implementation in a net-centric environment, one of the steps is to enable GIG Users to
discover sources of information and authoritative sources as a subset thereof. To provide
visibility of these sources, data assets shared across the enterprise are registered in the Federated
Enterprise Catalog.
The Federated Enterprise Catalog is a set of data assets metadata catalogs containing a list of
data assets and associated descriptive metadata (such as name, subject, creator, security,
location) about the data asset. The specification for this metadata is the DoD Discovery
Metadata Specification (DDMS). Content Discovery Service (a CES on the GIG) can be
invoked to search the Federated Enterprise Catalog for data assets that meet search criteria,
including assets designated as authoritative sources as shown in Figure 6-1.
Figure 6-1, Source Discovery in a Net-Centric Environment.
In order to appropriately describe data assets as authoritative sources, the Federated Enterprise
Catalog and it’s specification, the DDMS must be extended, as discussed in Section 6.3. An
assumption of the design of the Content Discovery Service is that Mission Areas, Components,
Call 11 - 4.2.4.1
22
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
and/or COIs will need to create it’s portion of the Federated Enterprise Catalog and populate it
with the appropriate information. This is discussed in the next steps.
6.2
Defense Discovery Metadata Specification Background
The DDMS is a DoD specification for the construction of schemas used in making specific
metadata descriptions of data assets. These metadata descriptions are to be placed into catalogs
that can support discovery—users can query the catalogs in terms of the metadata schemas to
find data assets that have descriptions showing they are useful to the user. The DDMS plays a
role similar to that of XML in relation to the specific XML schemas that constrain particular
documents to a specified format. DDMS-compliant schemas constrain metadata descriptions of
data assets to a certain format. Different types of data assets may require different types of
descriptive metadata. Note that this descriptive metadata is in addition to the schemas such as
XML or DBMS schemas that constraint the actual data of the data asset to a specific format. The
logical model of the DDMS is shown in Figure 6-2. The DDMS consists of a Core Layer made
up of Category Sets along with an Extensible Layer for use by COIs or Domains.
Figure 6-2, DDMS Logical Model.
To accommodate description of data assets or sources as authoritative sources, we are
recommending extension of the DDMS. This extension could be done as a COI or Domainspecific extension, but we believe that the concept of authoritative source is a common one, that
should be captured in the base metadata specifications. For this reason, we are recommending
extension of DDMS through the addition of another category set to the Core Layer of DDMS, as
shown in Figure 6-3.
Call 11 - 4.2.4.1
23
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
Figure 6-3, DDMS Logical Model Extended to Accommodate Authoritative Sources.
A detailed description of the extension is provided in section 6.3 below.
6.3
Authoritative Source Representation in DDMS
The DDMS Schema describes the metadata to be used in creating schemas for descriptions of
sources of information. For authoritative sources, we recommend that the DDMS be extended as
shown in Figure 6-3 above to include the additional metadata needed for describing the
authoritativeness of sources. In this section, we describe specific additions or extensions to the
DDMS to allow the description of authoritative sources, and provide examples using HTTP and
XML. These are new metadata elements or constructs that we propose be added to DDMS. We
refer to this set of metadata as the “Authoritative Source Category Set.”
As part of the Authoritative Source Category Set, we propose the addition of a new table or
structure to the DDMS, Authoritative Source Description. Based on the format of the current
DDMS, the structure of this table is shown in Table 6-1, which defines the Authoritative Source
Description table and its purpose.
Table 6-1, Authoritative Source Description Table Definition
Authoritative Source Description
Metadata
This category is used to tag the data asset and authoritative and to describe the
Category
nature of its authoritativeness.
Description
Obligation
Call 11 - 4.2.4.1
Optional
24
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
Modification
Date
Source or
Related
Reference
Comment
The actual elements with which the Authoritative Source Description table is populated are
shown in here in Table 6-2 at a high level. Some elements may be aggregates composed of a
number of elements. This level of detail remains to be worked out. The entries for Designating
Authority and Authority Scope are only Foreign Key entries, as the DDMS already contains a
table that captures information about DoD organizations, currently the organization’s
classification, owner/Producer, name, phone number, and email information.
Table 6-2, Authoritative Source Category Elements Table
Authoritative Source Category Elements
Name
Definition
Obligation Comment
Designating The authority that prescribes the source Mandatory
Authority as authoritative; the locus of the source’s
authoritativeness.
Authority
Scope
The purpose and/or audience for which Mandatory
the source is to be taken as authoritative.
Semantic
Range 2
The constraints that differentiate an
Optional
authoritative source based on a principle
of partitioning, such as by organization.
Data Scope The set of authoritative data or
information that the consumer can get
from the source.
Mandatory
Semantic Range is a unifying concept across possible partitioning criteria. It does not appear
here as a category element because at this time, the only partitioning criteria supported is by
organization. “Organization Semantic Range” is included to allow the description of this
semantic range in the metadata. Additional work is needed for Location, another possible
partitioning criteria, and other possible partitioning criteria as needed..
2
We have only investigated organization as a partitioning principle so far.
Call 11 - 4.2.4.1
25
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
The following table is an example of the Authoritative Source Description information a source
provider registers in the Enterprise Catalog, based on the requirements established by DDMS and
the extensions defined here. The examples contain the same information in three different
formats: Text, XML, and HTML.
Table 6-3, Example of DDMS Authoritative Source metadata
Authoritative Source Category Examples
Text
Designating Authority EntityType: Organization
Designating Authority Scope classification: U
Designating Authority ownerProducer: USA
Designating Authority Name: Joint Chief of Staff
Designating Authority Phone Number: 111-111-1111
Designating Authority Email: somecontact@dod.mil
Designating Authority Reference: Joint Publication 4-02
Authority Scope EntityType: Organization
Authority Scope classification: U
Authority Scope ownerProducer: USA
Authority Scope Name: U.S. Department of Defense
Semantic Range – Organization: EntityType: Organization
Semantic Range – Organization: classification: U
Semantic Range – Organization: ownerProducer: USA
Semantic Range – Organization: Name: U.S. Department of the Army
Data Scope: Organization Description
Authoritative Source Category Examples
XML
<Designating Authority IC:classification=”U” IC:ownerProducer=”USA”>
<Organization>
<Name>Joint Chief of Staff</Name>
<PhoneNumber>111-111-1111</PhoneNumber>
<Email>somecontact@dod.mil</Email>
</Organization>
<Authority Reference >
Joint Publication 4-02
</Authority Reference >
</Designating Authority>
<Authority Scope IC:classification=“U” IC:ownerProducer=“USA”>
<Organization>
<Name>U.S. Department of Defense</Name>
</Organization>
</Authority Scope>
Call 11 - 4.2.4.1
26
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
<Semantic Range Type=“Organization”>
<Organization IC:classification=“U” IC:ownerProducer=“USA”>
<Name>U.S. Department of the Army</Name>
</Organization>
</Semantic Range>
<Data Scope >
Organization Description
</Data Scope >
HTML
6.4
<meta name=“designatingauthority.classification” content=“U”>
<meta name=“designatingauthority.ownerProducer” content=“USA”>
<meta name=“designatingauthority.entityType” content=“Organization”>
<meta name=“designatingauthority.name” content=“Joint Chief of Staff”>
<meta name=“designatingauthority.phone” content= “111-111-1111”>
<meta name=“designatingauthority.email” content=“somecontact@dod.mil”>
<meta name=“authorityreference” content=‘Joint Publication 4-02”>
<meta name=“authorityscope.classification” content=“U”>
<meta name=“authorityscope.ownerProducer” content=“USA”>
<meta name=“authorityscope.entityType” content=“Organization”>
<meta name=“authorityscope.name” content=“U.S. Department of the Army”>
<meta name=“semanticrange.classification” content=“U”>
<meta name=“semanticrange.ownerProducer” content=“USA”>
<meta name=“semanticrange.entityType” content=“Organization”>
<meta name=“semanticrange.name” content=“U.S. Department of Defense”>
<meta name=“datascope” content= “Organization Description”>
Sharing and Visibility of Authoritative Sources
There are two basic ways of sharing data from sources, traditional and net-centric. Traditional
approaches are often tightly coupled, based on specific agreements, point-to-point
implementations from one system to another using Memoranda of Agreement or Service Level
Agreements. An example might be an interface between DEAMS to DIMHRS. These
implementations contain detailed and specific knowledge about both end-points in the interface,
and as such are brittle, requiring coordinated change between both participants.
A net-centric view of sharing data decouples the end-points with standards-based infrastructure,
allowing the end-points to interoperate through registered metadata information and formal
definition of capabilities, perhaps implemented through a common broker. This allows each side
to develop their connection to or provision of, services independently, and in a way that allows
for alternate providers and unanticipated consumers to construct or join in wide-scale business
processes. Providers register a source, in this case an authoritative source, providing necessary
information as metadata in a catalog to make the source visible and discoverable. By being
registered and provided through a standards-based service interface, the authoritative source is
Call 11 - 4.2.4.1
27
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
accessible, published to a shared space, available to any consumer that meets the requirements of
the service specification in the metadata, which may include stringent identification and
authentication as well as specific authorization of the consumer.
Many patterns for such net-centric sharing are available in the SOA, including publish-subscribe
models that can connect many providers with many consumers in a write-once, read-many
fashion without requiring any end-point to know or manage the number of providers or
consumers.
The following paragraphs highlight the traditional and net-centric approaches and the differences
between them.
6.4.1
Traditional Implementation of Authoritative Sources Approach
Users and systems can obtain authoritative data through many different mechanisms, each with
its own specific rules and methods of operation. The approach for identifying sources and
authoritative sources presented in this white paper can be used to describe such sources as well
as the more service-oriented approach we recommend here. Some traditional approaches
include:
•
File transfers, batch and on demand (FTP, EDI VAN)
•
Common Repositories
•
Point-to-point interfaces
•
Proprietary Message-Oriented Middleware (MOM) such as IBM’s WebSphere MQ,
Microsoft Message Queuing (MSMQ)
•
And, in some cases, through locally distributed computing services (MS DCOM, OMG
CORBA)
An information consumer interested in the information from such an authoritative source will
need to find out about its existence and then negotiate a contract in order to set up an exchange
through one of the mechanisms above. Depending on the mechanism, different steps are taken to
make the exchange operational. Traditional methods tend to require proprietary techniques and
produce tight coupling of interfaced systems, which is one of the reasons for the net-centric
move to a standards-based SOA.
A mitigating approach to the use of these traditional mechanisms is to wrap them with a software
layer that exposes their capabilities and information through a well-defined Web Services
interface. This restricts the proprietary techniques and tight-coupling to just the wrapper layer,
which can be dispensed with in favor of a direct implementation of the Web Service as the
underlying functionality provider matures. Similar results for sources required only locally—
within some span of control over the use of technology—can be obtained using other serviceoriented component implementation approaches, as described in the next section.
Call 11 - 4.2.4.1
28
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
6.4.2
1.0
Net-Centric—SOA and Web Services – Implementation of Authoritative Sources
Approach
In a SOA, authoritative data is made available to others through standards-based services—
packages of functionality with well-defined and registered interfaces that define the bounds of
interaction and available content. In a net-centric environment, the enterprise-wide approach to
such a SOA is through Web Services coordinated in an enterprise-wide SOA infrastructure,
providing ESB-style support and other common and important capabilities revolving around
security and dynamic configuration and version management to ensure the robustness of the
network of providers and consumers and the business processes they execute.
Locally, within a node where more detailed architectural control can be exercised, an SOA may
be encapsulated islands of other component architectures providing the implementation of a
SOA’s features—dotNET, COM/DCOM, CORBA, or Java EJBs. Where these local capabilities
need to be made available outside the domain of control, they are still made available to the
enterprise through Web Services. This process, which can be used to transition traditional
sharing mechanisms to a net-centric, service-oriented approach as well, involves several steps:
•
Define a service interface that cleanly exposes the source
•
Define XML-based message sets, specifying the format and tagging of the data in an
XML Schema
•
Implement the service so that it can access the existing functionality on the one hand, and
expose it through standard Web Services mechanisms on the other
•
Registering the service, including registration as an authoritative source, in DDMS,
thereby advertising the service and so the authoritative source
•
Place the needed service metadata in a catalog, such as a UDDI Registry (Service
Registry), enabling other GIG users to consume the service.
Call 11 - 4.2.4.1
29
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
7
1.0
Next Steps
The approach presented in this white paper begins to meet its objectives when it is realized in
updates to the architecture and the net-centric metadata. This section articulates recommended
next steps in three areas: (1) updates to the BEA, (2) registration of authoritative sources in a netcentric environment, and (3) related strategy work for guiding implementation.
7.1
Updates to BEA
To move the approach forward, the next step is to test the approach for describing authoritative
sources in the BEA. As described below, the recommended next steps include a test phases in
which the authoritative source descriptions and linkages to the architectures are developed for a
subset of Business Enterprise Systems. This test will be “on paper” with an assessment and
report at its conclusion. The results of the test phase will be used to best plan for rigorous
designation of authoritative systems and population of relevant metadata across the BMA. The
specific recommended steps are:
1.
Collaborate with stakeholders to refine and come to consensus on approach presented in
this white paper
2.
Identify DBSAE systems for test of authoritative source description approach
3.
Develop paper test

Work with appropriate BEP staff for the designated DBSAE systems

Develop and populate the authoritative source metadata for those systems

Develop, modify and/or populate the appropriate DoDAF views with the
authoritative source metadata

Develop and populate the enterprise catalog to describe the designated systems
within the GIG environment
4.
Assess the results against the objectives with BEA architects and BEP staff
5.
Draft a report on the test of the authoritative source description approach
6.
Document the recommended approach for describing authoritative sources in BEA 4.0
in a BEA Decision Memorandum
7.
Modify BEA System Architect meta-model as appropriate
8.
Work with the architecture development team to plan for further population of
authoritative source designations for BEA release 4.0 and future BEA releases
Through the designation and description of authoritative sources of information across the
business community, portfolio management processes can make associated decisions to maintain
and enhance the trusted sources of data across the BMA. This will in turn, create the
environment in which consumers of information can be confident in the information they use for
making decisions.
Call 11 - 4.2.4.1
30
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
7.2
1.0
Registration of Authoritative Sources in a Net-Centric Environment
As described in Section 6, the net-centric environment will support data sharing across the
department by providing mechanisms and standards for making data assets visible and for
finding those data assets. We recommend the following steps for moving the BMA toward this
operating environment:
7.3
1.
Collaborate with NII to assess applicability of authoritative source description DDMS
extensions to the department.
2.
Work with BMA stakeholders to determine its plan for registering data assets with the
Enterprise Catalog by standing up its own Data Assets Catalog or looking to an existing
program or initiative for this functionality.
3.
Work with data assets owners to tag their assets according to DDMS and the
authoritative source description extensions.
Related Strategy Work
As mentioned in Section1, there are some topics related to authoritative sources that deserve
further examination. Specifically, the issue of transitive trust and its role in allowing further
designation of authoritative sources may prove useful in the business operating environment in
which data sets can be very large in volume and not conducive to real-time cross-source access.
Allowing sources to assert authoritativeness through transitive trust may allow more efficient
access to information and more confidence in the quality of the information.
In addition, the approach for partitioning data sets by semantic range in order to assert
authoritativeness needs additional work. This paper addresses partitioning by organization as
appears to be the most common case. Additional exploration is needed to address the general
case of partitioning any element. The need for this work will be driven by the department’s
operating environment and the situations in which partitioning of authoritative data is useful to
the community.
Identifying and describing authoritative sources in the BEA and the operational environment is a
step toward data interoperability for the business community. As the approach for authoritative
sources is approved and implemented, we anticipate developing an approach for data
interoperability that begins to address the data that moves across the constituents of the
enterprise for operational and decision-making purposes.
Lastly, the approach set forth here is a step toward the vision for service-oriented architecture
and how it might impact or shape the BEA and the federation constituents. The refinement of
the systems view to include service interfaces and service instantiations allows the architecture to
define technology-independent specifications to guide and constrain implementations whether
they be initiatives making use of traditional technologies or those adopting net-centric
technologies. This SOA work will include the approach for representing CES and ESB in the
BEA and/or the constituents of the federation of architectures.
Call 11 - 4.2.4.1
31
February 28, 2006
Strategy and Architectural Representation for Describing
Authoritative Sources in BEA 4.0
1.0
Appendix A – References
Table A-1 lists documents referenced in this document and other documents used for background
research.
Table A-1, Reference Documents
Ref #
Referenced Document
Date/Version
1
Business Enterprise Architecture
30 September 2005
Version 3.0
2
BMA Net-Centric Strategy
29 March 2005,
Version 4.0
3
Data Sharing in a Net-Centric Department of Defense Directive 8320.2
2 December 2004
4
Department of Defense Discovery Metadata Specification (DDMS)
29 July 2005,
Version 1.3
5
Department of Defense Enterprise Transition Plan Volume 1: Defense Business
Transformation Overview
30 September 2005
6
DoD Net-Centric Data Strategy
9 May 2003
7
Implementation Guide for Department of Defense Directive 8320.2 (DoD
8320.2-G)
23 May 2005,
Version 0.7 (Draft)
8
Net-Centric Operations and Warfare Reference Model (NCOW RM)
17 November 2005,
Version 1.1
9
Service-Oriented Architecture: A Field Guide to Integrating XML and Web
Services, by Thomas Erl, Prentice-Hall PTR, Upper Saddle River, New Jersey
07458,
2004, ISBN 0-13142898-5
10
Service-Oriented Architecture: Concepts, Technology, and Design, by Thomas
Erl, Prentice-Hall PTR, Upper Saddle River, New Jersey 07458,
2005, ISBN-0-13185858-0
11
Tailoring DoDAF to Support a Service-Oriented Architecture, Huei-Wan Ang,
Christopher Bashioum, Fatma Dandashi, William Kirkman
January 2006
12
Web Services Architecture, W3C Working Group Note 11
February 2004
http://www.w3.org/TR/2004/NOTE-ws-arch-20040211/
Version 20040211
13
Web Services Architecture and its Specifications: Essentials for Understanding
WS-*, Luis Felipe Cabrera and Chris Kurt, Microsoft Press, Redmond
Washington
2005, ISBN 0-73562162-4
14
Web Service Standard C2 User Requirements
8 December 2003,
Final
Call 11 - 4.2.4.1
A-1
February 28, 2006
Download