Browse National Center for Supercomputing Applications (NCSA) by Author "Welch, Von"

  • Ananthakrishnan, Rachana; Bagchi, Saurabh; Barnett, Bill; Basney, Jim; Butler, Randy; Choudhury, Sayeed; Dempsey, Heidi; Fox, Geoffrey; Hazelwood, Victor; Klingenstein, Ken; Koranda, Scott; Livny, Miron; Meunier, Pascal; Newhouse, Steven; Pearson, Doug; Poole, Scott; Pordes, Ruth; Renaut, Rosemary; Servilla, Mark; Singer, Abe; Slagell, Adam; Vieglais, Dave; Welch, Von; West, Patrick; Yahja, Alex (2010)
    Report of the NSF Workshop on Scientific Software Security Innovation Institute On August 6, 2010, a group of NSF researchers met in Arlington, Virginia, in response to an NSF Dear Colleague Letting (NSF 10-050) call ...

    application/pdf

    application/pdfPDF (1MB)
  • Altunay, Mine; Ananthakrishnan, Rachana; Arrott, Matthew; Barnet, Steve; Barnett, William; Basney, Jim; Beaty, Steve; Butler, Randy; Choudhury, Sayeed; Dempsey, Heidi; Dooley, Rion; Freemon, Michael; Fox, Geoffrey; Keahey, Kate; Klingenstein, Ken; Koranda, Scott; Livney, Miron; Marsteller, James; McGee, John; Meunier, Pascal; Moore, Reagan; Newhouse, Stephen; Pearson, Doug; Petravick, Don; Plale, Beth; Plante, Ray; Poole, Scott; Pordes, Ruth; Serville, Mark; Singer, Abe; Slagell, Adam; Thompson, Kevin; Vieglas, Dave; Welch, Von; West, Patrick; Yahja, Alex (2011)
    Over the period of 2010-2011, a series of two workshops were held in response to NSF Dear Colleague Letter NSF 10-050 calling for exploratory workshops to consider requirements for Scientific Software Innovation Institutes ...

    application/pdf

    application/pdfPDF (1MB)
  • Welch, Von (2017-12-11)
    The NSF Cybersecurity Center of Excellence (CCoE) leads the NSF community in addressing the cybersecurity challenges in producing trustworthy science. Beginning as the Center for Trusted Scientific Cyberinfrastructure ...

    application/pdf

    application/pdfPDF (13MB)
  • Welch, Von (2019-05-30)
    How can cybersecurity play an enabling role in scientific research? This talk describes the first five years of experience from NSF Cybersecurity Center of Excellence, its vision for the next five, and its take on how ...

    application/pdf

    application/pdfPDF (8MB)
  • Welch, Von; Sons, Susan; Marsteller, James; Biever, Richard; Kouper, Inna; Corn, Michael (2019-01-28)
    The research and education (R&E) community faces particular challenges regarding cybersecurity: diversity of size and autonomy, the use of diverse infrastructure (scientific instruments, sensor networks, sequencers, etc.), ...

    application/pdf

    application/pdfPDF (9MB)
  • Basney, Jim; Welch, Von; Brunson, Dana; Shankar, Anurag; Avila, Kay; Krenz, Mark; Del Vento, Davide; Chourasia, Amit; Wong, Mona; Marru, Suresh; Adams, Eric; Weitzel, Derek; Trivedi, Shivam; Mandal, Anirban; Barton, Tom (2019-07-30)
    The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sharing experiences, recommendations, and available resources for addressing cybersecurity challenges in research computing. ...

    application/pdf

    application/pdfPDF (2MB)