- IDEALS Home
- →
- National Center for Supercomputing Applications (NCSA)
- →
- Trusted CI
- →
- Trusted CI Presentations and Reports
- →
- Browse Trusted CI Presentations and Reports by Issue Date
Browse Trusted CI Presentations and Reports by Issue Date
Now showing items 1-20 of 63
-
(17-11-28)The Report of the California State Polytechnic University Pomona SFS Engagement
application/pdf
PDF (395kB)
-
(2017-10-23)This talk presents various aspects and challenges of monitoring and security of a big research network while keeping it open and usable. We focus on issues faced due to following attributes: * decentralization * high ...
application/pdf
PDF (13MB)
-
(2017-10-27)Cal Poly Pomona and NSF Center for Trustworthy Scientific Cyberinfrastructure (CTSC) organized an on-site workshop at Cal Poly Pomona for CyberCorps Scholarship for Service (SFS) students nationwide that discussed the ...
application/pdf
PDF (941kB)
-
(2017-12)A collection of training presentations covering federated identity management for research organization, presented at the 2017 AGU New Orleans conference. Hands-on exercises are included in this submission. The topics ...
application/pdf
PDF (13MB)
-
(2017-12-11)The NSF Cybersecurity Center of Excellence (CCoE) leads the NSF community in addressing the cybersecurity challenges in producing trustworthy science. Beginning as the Center for Trusted Scientific Cyberinfrastructure ...
application/pdf
PDF (13MB)
-
(2018-02-26)Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. Although the blockchain ...
application/pdf
PDF (1MB)
-
(2018-03-26)In this talk, we are presenting our work on building a data quality and security (DQS) framework, which integrates cybersecurity with other diverse metrics, such as accuracy, reliability, timeliness, and safety into a ...
application/pdf
PDF (9MB)
-
(2018-04-23)Data-intensive science collaborations increasingly provision dedicated network circuits to share and exchange datasets securely at high speed, leveraging national-footprint research fabrics such as ESnet or I2/AL2S. This ...
application/vnd.openxmlformats-officedocument.presentationml.presentation
Microsoft PowerPoint 2007 (9MB)
-
(2018-05-21)The European Union’s General Data Protection Regulation (GDPR) is slated to come into effect on May 25, 2018, and organizations around the world are struggling to determine whether they are covered, what is required, and ...
application/pdf
PDF (322kB)
-
(2018-06-25)The concept behind the Large Synoptic Survey Telescope (LSST) is simple: conduct a digital image-based survey over an enormous area of the sky and build an extensive astronomical catalogue over the course of ten years. ...
application/pdf
PDF (6MB)
-
(2018-07-23)There has been an unprecedented increase in the quantity of research data available in digital form. Combining these information sources within analyses that leverage cloud computing frameworks and big data analytics ...
application/pdf
PDF (7MB)
-
(2018-07-24)Workshop presented at PEARC18. This 3-hour workshop covers practical information security for science projects by describing the foundational elements of a cybersecurity program necessary to provide a secure and safe ...
application/pdf
PDF (5MB)
-
(2018-08-17)"Cybersecurity for Gateways" is a Trusted CI presentation from the August 2018 SGCI Bootcamp, held in Chicago, IL. The presentation was written by Jim Basney. The Science Gateways Community Institute (SGCI) provides ...
application/pdf
PDF (1MB)
-
Trusted CI Webinar: NIST 800-171 Compliance Program at University of Connecticut with Jason Pufahl (2018-08-27)NOTE: Please contact Jason Pufahl directly to request a copy of the spreadsheet discussed in the presentation: jason.pufahl@uconn.edu The Department of Defense established DFARS 252. 204-701 which specifies that any ...
application/pdf
PDF (3MB)
-
(2018-09-24)E-Infrastructures recognise that controlling information security is crucial for providing continuous and trustworthy services for their user communities. Such infrastructures, including grids and clouds, are subject to ...
application/pdf
PDF (3MB)
-
(2018-10-22)We're at an important stage in the history of science. The internet has dramatically accelerated the pace and scale of communication and collaboration. We have the computational resources to mine and discover complex ...
application/pdf
PDF (20MB)
-
(2018-11-21)Trusted CI final report of the 2018 engagement with the Environmental Data Initiative.
application/pdf
PDF (12MB)
-
(2018-12-10)A “cloud resource” provides a hosted, self-service means for users to run virtual machines or containers such that they can have a custom software stack and isolation from other users. Virtual machines or container images ...
application/pdf
PDF (3MB)
-
(2019-01-28)The research and education (R&E) community faces particular challenges regarding cybersecurity: diversity of size and autonomy, the use of diverse infrastructure (scientific instruments, sensor networks, sequencers, etc.), ...
application/pdf
PDF (9MB)
-
(2019-02-11)Presentation at the 13th FIM4R Workshop: Federated Identity Management for Research Collaborations.
application/pdf
PDF (3MB)
Now showing items 1-20 of 63