Today, a large number of researchers do not have access to secure, compliance-capable research computing infrastructure at their home institutions. Traditional institutional secure CI only supports “in-house” users. The ACCORD project is set up to address the challenge of scaling institutional secure research computing services to support community users. To accomplish this goal, we are deploying a policy-centric cyberinfrastructure that prioritizes security, compliance, and accessibility. In this presentation, we describe ACCORD’s approach of leveraging the latest CI tools to compartmentalize research environments into reusable containers that can be catalogued and managed. For example, we rely on InCommon federation to streamline user aut...
As the demand for research computing dealing with sensitive data increases, institutions like the Na...
This webinar presents the results of Trusted CI's 2021 examination of the state of software assuranc...
The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sh...
Data-intensive science applications in research fields such as bioinformatics, chemistry, and materi...
E-Infrastructures recognise that controlling information security is crucial for providing continuou...
The REED+ framework integrates NIST SP 800-171 and other related NIST publications as the foundation...
Advances in computer systems over the past decade have laid a solid foundation for data collection a...
The research and education (R&E) community faces particular challenges regarding cybersecurity: dive...
The OSG Consortium provides researchers with the ability to bring their distributed high throughput ...
There has been an unprecedented increase in the quantity of research data available in digital form....
The Trusted CI Framework is a tool to help organizations establish and refine their cybersecurity pr...
In this presentation, we will present the motivations behind and structure for the Trusted CI Framew...
At one time, higher-ed was the requestor of HECVAT's - now we are being called to populate them for ...
We're at an important stage in the history of science. The internet has dramatically accelerated the...
NOTE: Please contact Jason Pufahl directly to request a copy of the spreadsheet discussed in the pre...
As the demand for research computing dealing with sensitive data increases, institutions like the Na...
This webinar presents the results of Trusted CI's 2021 examination of the state of software assuranc...
The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sh...
Data-intensive science applications in research fields such as bioinformatics, chemistry, and materi...
E-Infrastructures recognise that controlling information security is crucial for providing continuou...
The REED+ framework integrates NIST SP 800-171 and other related NIST publications as the foundation...
Advances in computer systems over the past decade have laid a solid foundation for data collection a...
The research and education (R&E) community faces particular challenges regarding cybersecurity: dive...
The OSG Consortium provides researchers with the ability to bring their distributed high throughput ...
There has been an unprecedented increase in the quantity of research data available in digital form....
The Trusted CI Framework is a tool to help organizations establish and refine their cybersecurity pr...
In this presentation, we will present the motivations behind and structure for the Trusted CI Framew...
At one time, higher-ed was the requestor of HECVAT's - now we are being called to populate them for ...
We're at an important stage in the history of science. The internet has dramatically accelerated the...
NOTE: Please contact Jason Pufahl directly to request a copy of the spreadsheet discussed in the pre...
As the demand for research computing dealing with sensitive data increases, institutions like the Na...
This webinar presents the results of Trusted CI's 2021 examination of the state of software assuranc...
The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sh...