In 2021, Trusted CI is conducting our focused "annual challenge" on the security (sometimes called "assurance") of software used by scientific computing and cyberinfrastructure. The goal of this year-long project, involving seven Trusted CI members, is to broadly improve the robustness of software used in scientific computing with respect to security. During the first part of the year, Trusted CI interviewed creators of scientific software and released a findings report based on those conversations. Part of that effort focused on identifying gaps in the software security of the projects and analyzing what barriers prevented them from being addressed. This guide is a direct result of those findings and attempts to begin bridging those gap...
With the rapid advancement of technology, society’s reliance on computers and the internet has incre...
E-Infrastructures recognise that controlling information security is crucial for providing continuou...
The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., ...
In 2021, Trusted CI is conducting our focused "annual challenge" on the security (sometimes called "...
This webinar presents the results of Trusted CI's 2021 examination of the state of software assuranc...
The advancement of technology has made the development of software applications become unstoppabl...
Software security is concerned with the protection of data, facilities and applications from harm th...
The research in software engineering towards security is getting rich attention. New security bre...
Presentation at the 13th FIM4R Workshop: Federated Identity Management for Research Collaborations.O...
Copyright © 2014 Cuixue Zhang et al. This is an open access article distributed under the Creative C...
This document is a product of the Center for Trustworthy Scientific Cyberinfrastructure (CTSC). CTSC...
There has been an unprecedented increase in the quantity of research data available in digital form....
Secure development is not just a technical problem: it’s a human and organizational problem as well....
The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sh...
ESA is developing, deploying, and operating a wide variety of mission data systems for the command &...
With the rapid advancement of technology, society’s reliance on computers and the internet has incre...
E-Infrastructures recognise that controlling information security is crucial for providing continuou...
The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., ...
In 2021, Trusted CI is conducting our focused "annual challenge" on the security (sometimes called "...
This webinar presents the results of Trusted CI's 2021 examination of the state of software assuranc...
The advancement of technology has made the development of software applications become unstoppabl...
Software security is concerned with the protection of data, facilities and applications from harm th...
The research in software engineering towards security is getting rich attention. New security bre...
Presentation at the 13th FIM4R Workshop: Federated Identity Management for Research Collaborations.O...
Copyright © 2014 Cuixue Zhang et al. This is an open access article distributed under the Creative C...
This document is a product of the Center for Trustworthy Scientific Cyberinfrastructure (CTSC). CTSC...
There has been an unprecedented increase in the quantity of research data available in digital form....
Secure development is not just a technical problem: it’s a human and organizational problem as well....
The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sh...
ESA is developing, deploying, and operating a wide variety of mission data systems for the command &...
With the rapid advancement of technology, society’s reliance on computers and the internet has incre...
E-Infrastructures recognise that controlling information security is crucial for providing continuou...
The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., ...