1. Topic
  2. Floating Topic
  3. Abstract
  4. Description
    1. Problem Statement & Context
      1. Problem Statement
      2. Context
        1. Definition
          1. What is cloud computing?
          2. Definition
          3. Three Delivery models
          4. Software-as-a-Service
          5. Example
          6. Salesforce.com
          7. Platform-as-a-Service
          8. Example
          9. Google AppEngine
          10. Force.com
          11. Infrastructure-as-a-Service
          12. Example
          13. Amazon Web Service
          14. Unisys
          15. EMC Atmos
          16. Loudcloud
          17. Services
          18. Compute
          19. Physical Machines
          20. Virtual Machines
          21. OS-level virtualization
          22. Network
          23. Storage
          24. Other as-a-service
          25. Rational for adopting NIST definition
          26. Consideration for other delivery models
          27. DEsktop-as-a-service
          28. Data-as-a-Service
          29. Grid-as-a-service
          30. Utility COmputing
          31. Four Deployment Models
          32. Public Cloud
          33. Private Cloud
          34. Community Cloud
          35. Hybrid Cloud
          36. Five essential characteristics
          37. Rapid Elasticity
          38. Measured Service
          39. On-Demand Self-Service
          40. Ubiquitous Network Access
          41. Resource Pooling
          42. Two Domains
          43. Enterprise
          44. Tactical/DEployable/Adhoc (Need new name)
          45. Cloud computing is not.
          46. Grid Computing
          47. Utility Computing
          48. Autonomic Computing
        2. Government Cloud Computing Examples
          1. United States
          2. European Union
          3. Canada
          4. United Kingdom
          5. Japan
        3. Architectural TEnants
    2. Pre-Conditions
    3. Participants
      1. Taxonomy
        1. Service Consumer
        2. Service Provider
        3. Service Developer
    4. Structure
      1. Critical Elements
        1. HCC On-Premise Environment
        2. HCC Public and Private Clouds
        3. HCC Mobile and Hand Held Devices
    5. Use Case Scnarios
      1. Enterprise
        1. End User to Cloud
          1. Cloud-based collaborative environment
        2. Enterprise to CLoud to End User
        3. Enterprise to Cloud
          1. Cloud Bursting
        4. Enterprise to Cloud to Enterprise
          1. Virtually binding shipboard & Land vehicle IT infrastrcutures
        5. Private Cloud
        6. Community Cloud
        7. Changing Cloud Vendors
        8. Hybrid Cloud
      2. Tactical/Deployable (Additional Requirements)
        1. Limited/Intermittent Connectivity
        2. Network Connection Authentication
        3. Redundant Compute/Storage Processes
        4. Autonomic Capabilities
    6. Post Conditions
  5. Implementation Guidance
    1. Requirements
      1. Security Requirements
        1. Regulations
        2. Security Controls
          1. Asset Management
          2. Cryptography: Key and Certificate Managemnt
          3. Data/Storage Security
          4. Endpoint Security
          5. Event Auditing and Reporting
          6. Identity, Roles, Access Control and Attributes
          7. Network Security
          8. Security Policies
          9. Service Automation
          10. Workload and Service Management
        3. Security Federation Patterns
          1. Trust
          2. Identity Management
          3. Access Management
          4. Single Sign-on / Sign-Off
          5. Audit and Compliance
          6. Configuration Management
      2. Developer Requirements
        1. Caching
        2. Centralized Logging
        3. Database
        4. Identity Management
        5. Messaging-Point-to-Point
        6. Messaging-Pub-Sub
        7. Raw Compute / Job Processing
        8. Session Management
        9. Service Discovery
        10. SLAs
        11. Storage
      3. Operational Requirements
        1. End User to Cloud
          1. Identity
          2. Open Client
          3. Security
          4. SLA
        2. Enterprise to Cloud to End User
          1. Indentity
          2. Open CLient
          3. Federated Identity
          4. Location Awareness
          5. Metering and Monitoring
          6. Management and Governance
          7. Security
          8. Common File Format for VMs
          9. Common APIs for Cloud Storage and Middleware
          10. Data and Application Federation
          11. SLAs and Benchmarks
          12. Lifecycle Management
        3. Enterprise to Cloud
          1. Federated Identity
          2. Open CLient
          3. Location Awareness
          4. Indentity
          5. Metering and Monitoring
          6. Management and Governance
          7. Security
          8. Common File Format for VMs
          9. Common APIs for Cloud Storage and Middleware
          10. Data and Application Federation
          11. SLAs and Benchmarks
          12. Lifecycle Management
          13. Deployment
          14. Industry-specific standards and protocols
        4. Enterprise to Cloud to Enterprise
          1. Federated Identity
          2. Open CLient
          3. Location Awareness
          4. Indentity
          5. Metering and Monitoring
          6. Management and Governance
          7. Security
          8. Common File Format for VMs
          9. Common APIs for Cloud Storage and Middleware
          10. Data and Application Federation
          11. SLAs and Benchmarks
          12. Lifecycle Management
          13. Deployment
          14. Industry-specific standards and protocols
          15. Transaction Concurrency
          16. Interoperability
        5. Private Cloud
          1. Open Client
          2. Metering & Monitoring
          3. Management & Governance
          4. Security
          5. Deployment
          6. Interoperability
          7. Common Vm Format
          8. SLAs
        6. Changing Cloud Vendors
          1. Open Client
          2. Location Awareness
          3. Security
          4. SLAs
          5. Common VM file format
          6. Common CLoud Storage API
          7. Common Cloud Middleware API
          8. SaaS Vendor
          9. Industry-specific standards
          10. Changing Middleware VEndors
          11. Industry-specific standards
          12. Common Cloud Middleware APIs
          13. Changing Cloud Storage VEndors
          14. Common CLoud Storage API
          15. Changing VM host
          16. Common VM Format
        7. Hybrid Cloud
          1. Federated Identity
          2. Open CLient
          3. Location Awareness
          4. Indentity
          5. Metering and Monitoring
          6. Management and Governance
          7. Security
          8. Common File Format for VMs
          9. Common APIs for Cloud Storage and Middleware
          10. Data and Application Federation
          11. SLAs and Benchmarks
          12. Lifecycle Management
          13. Deployment
          14. Industry-specific standards and protocols
          15. Interoperability
    2. Standards
      1. Taxonomy
        1. Across Cloud Services
        2. Within Cloud Services
        3. Between the Cloud and Enterprise
        4. Within an Enterprise
      2. SOA
      3. Cloud Computing
      4. Enterprise Security
      5. Mobile handheld application development
      6. Virtualization
      7. API
        1. Levels
          1. The Wire
          2. Language-specific Toolkits
          3. Service-specific Toolkit
          4. Service-neutral Toolkit
        2. Categories
          1. Ordinary PRogramming
          2. Deployment
          3. Cloud Services
          4. Image and Infrastructure Management
          5. Internal Interfaces
      8. Security Controls
        1. Cryptography: Key and Certificate Managemnt
        2. Data/Storage Security
        3. Identity, Roles, Access Control and Attributes
        4. Security Policies
        5. Workload and Service Management
    3. Interoperability
      1. Storage
        1. ThriftStore
        2. PySector
        3. SectorJNI
      2. Compute
        1. Sector File System for Hadoop
        2. PySphere
    4. Additional Guidance
      1. NIF Guidance
      2. Specialized Frameworks Guidance
        1. Application capability
        2. Community of Interest capability
        3. Integration capability
        4. Communications capability
        5. Information capability
        6. Information assurance capability
        7. System and network control capability
      3. Expert advice
        1. Lessons Learned
          1. SOA is foundational
          2. Match cloud deployment & delivery model
          3. Standards are nacent & evolving
          4. Mobile devices are critical application entry point
          5. Appropriate cloud service identification required for sucessful business model
          6. Cloud Computing not appropriate for all applications
          7. Pay attention to business and culture in security model
          8. Standard enterprise architecture, security and implementation still required
        2. Constraints
          1. Real-time access to data and cloud services
          2. Real-time dynamic brokers
          3. Certification and accreditqation
          4. Federated cloud architectures
          5. Legal & Cultural issures
      4. Related Patterns
        1. Published
          1. Legacy Services Capability Pattern
          2. Disconnected, Intermittent, Limited (DIL) Communications Management Pattern
          3. Design Phase Service Integration
          4. All Hazards Alert and Warning
          5. Secure Formatted Information Exchange Gateway
          6. Core Network Access
          7. Space, Air, Ground, Maritime Mobile Networks
          8. Information Dissemination and Shared Database
        2. Proposed/Required/Under Discussion
    5. Known Uses
    6. Potential Capability
    7. References
  6. Verification
    1. Terms
    2. Approaches
    3. Meeting Requirements
    4. Building Block Conformance Requirements