Browse XSEDE Operations by Title

  • XSEDE Architecture Team (2013-09-25)
    This documents Canonical Use Case 4, Interactive Login, for the XSEDE project architecture.

    application/pdf

    application/pdfPDF (921kB)
  • XSEDE Security Working Group (2014-04-29)
    Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security baseline document approved by the XSEDE Security Working Group (XSWoG). ...

    application/pdf

    application/pdfPDF (766kB)
  • XSEDE Security Working Group (2014-08-12)
    New version of document available: http://hdl.handle.net/2142/97877. Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security ...

    application/pdf

    application/pdfPDF (791kB)
  • (2015-04-30)
    This document defines a set of Common User Environment (CUE) variables for the XSEDE project. The CUE variables enable users to optionally set and add common environment variables to their interactive and batch environments ...

    application/pdf

    application/pdfPDF (754kB)
  • Hazlewood, Victor; Slagell, Adam; Marstellar, Jim; Lindsay, Susan (2017-08-23)
    Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security baseline document approved by the XSEDE Security Working Group (XSWoG). ...

    application/pdf

    application/pdfPDF (717kB)
  • XSEDE Security Working Group (2015-01-01)
    The purpose of this agreement is to define the expectations and responsibilities of the XSEDE Level 1 service providers with respect to security and incident response. This agreement between these service providers and ...

    application/pdf

    application/pdfPDF (769kB)
  • XSEDE Security Working Group (2016-03-31)
    The purpose of this agreement is to define the expectations and responsibilities of the XSEDE Level 1 service providers with respect to security and incident response. This agreement between these service providers and ...

    application/pdf

    application/pdfPDF (700kB)
  • XSEDE Security Working Group (2013-07-08)
    This is a set of standard security controls that are to be applied at each Level 1 Service Provider along with additional guidelines for securing XSEDE resources.

    application/pdf

    application/pdfPDF (116kB)
  • XSEDE Security Working Group (2015-03-20)
    This document describes the personal information collected by XSEDE and how XSEDE treats and handles such information.

    application/pdf

    application/pdfPDF (725kB)
  • (2012-02-22)
    The XSEDE Service Provider Software and Services Baseline describes the software and services that XSEDE service providers may, and in some cases must, deploy in their computational environments.

    application/pdf

    application/pdfPDF (1MB)
  • (2012-02-22)
    This document describes the technical security mechanisms currently in operation in XSEDE to support secure access to XSEDE resources. Currently, these mechanisms are all inherited from TeraGrid without modification for ...

    application/pdf

    application/pdfPDF (686kB)
  • XRAS Team (2013-09-25)
    This document describes the 10 Use Cases required for the XSEDE Resource Allocation Process.

    application/pdf

    application/pdfPDF (939kB)
  • XSEDE Security Working Group (2014-01-16)
    “Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.

    application/pdf

    application/pdfPDF (131kB)
  • XSEDE Security Working Group (2014-04-29)
    “Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.

    application/pdf

    application/pdfPDF (783kB)
  • XSEDE Security Working Group (2014-01-16)
    “Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.

    application/pdf

    application/pdfPDF (130kB)
  • XSEDE Security Working Group (2013-12-17)
    “Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.

    application/pdf

    application/pdfPDF (129kB)
  • XSEDE Security Working Group (2013-07-25)
    This is a guideline outlining processes for incident response for security professionals at the service providers, help desk staff, and public relations.

    application/pdf

    application/pdfPDF (196kB)
  • XSEDE Security Working Group (2014-05-05)
    Incident response guidelines are provided for: responders at the Level 1 Service Provider (SP) where the initial incident occurs ("Initial Responder"), responders at any other Level 1 SPs ("Secondary Responders), XSEDE ...

    application/pdf

    application/pdfPDF (841kB)
  • XSEDE Security Working Group (2014-08-12)
    Incident response guidelines are provided for: responders at the Level 1 Service Provider (SP) where the initial incident occurs ("Initial Responder"), responders at any other Level 1 SPs ("Secondary Responders), XSEDE ...

    application/pdf

    application/pdfPDF (859kB)
  • XSEDE Security Working Group (2016-03-31)
    This document provides incident response guidelines for: responders at the Level 1 Service Provider (SP) where the initial incident occurs ("Initial Responder"), responders at any other Level 1 SPs ("Secondary Responders), ...

    application/pdf

    application/pdfPDF (794kB)