Conveners
Network, Security, Infrastructure & Operations I
- Gang Chen (Institute Of High Energy Physics)
Dr
David Kelsey
(STFC-RAL)
3/7/17, 2:00 PM
Networking, Security, Infrastructure & Operations
Research Infrastructures increasingly use national and global “Research and Education” (R&E) authentication federations to provide access to their services. Collaborators log on using their home organization credentials, the Research Infrastructure (RI) enriches it with community information, and access decisions are made on its combined assertions. Studies in the AARC project have shown that...
Dr
David Crooks
(University of Glasgow)
, Mr
Liviu Vâlsan
(CERN)
3/7/17, 2:20 PM
Networking, Security, Infrastructure & Operations
Security monitoring is an area of considerable interest for sites in the Worldwide LHC Computing Grid (WLCG), particularly as we move as a community towards the use of a growing range of computing models and facilities. There is an increasingly large set of tools available for these purposes, many of which work in concert and use concepts drawn from the use of analytics for Big Data. The...
Ms
Hannah Short
(CERN)
3/7/17, 2:40 PM
Networking, Security, Infrastructure & Operations
As most are fully aware, cybersecurity attacks are an ever-growing problem as larger parts of our lives take place on-line. Distributed digital infrastructures are no exception and action has to be taken to both reduce the security risk and to handle security incidents when they inevitably happen. These activities are carried out by the various e-Infrastructures and it has become very clear in...
Dr
Sven Gabriel
(Nikhef/EGI)
, Mr
Vincent Brillault
(CERN)
3/7/17, 3:00 PM
Networking, Security, Infrastructure & Operations
Operational Security in Scientific distributed IT-Infrastructures
like EGI is challenging. Existing computation frameworks get further extended,
and new technologies implemented.
In this evolving environment new policies have to be developed, and existing
policies and procedures have constantly to be extended to meet new requirements.
To efficiently enforce new policies, the security...