Description
Networking and the connected e-Infrastructures are becoming ubiquitous. Ensuring the smooth operation and integrity of the services for research communities in a rapidly changing environment are key challenges. This track focuses on the current state of the art and recent advances in these areas: networking, infrastructure, operations, security and identity management. The scope of this track includes advances in high-performance networking (software defined networks, community private networks, the IPv4 to IPv6 transition, cross-domain provisioning), the connected data and compute infrastructures (storage and compute systems architectures, improving service and site reliability, interoperability between infrastructures, data centre models), monitoring tools and metrics, service management (ITIL and SLAs), and infrastructure/systems operations and management. Also included here are issues related to the integrity, reliability, and security of services and data: developments in security middleware, operational security, security policy, federated identity management, and community management. Submissions related to the general theme of the conference are particularly welcome.
Implementing a Risk Management Process to a distributed infrastructure can be a tedious task. Usually one need to agree on a certain Risk management methodology, get a clear picture on the scope and the governance, and from that assign the relevant roles and responsibilities. Clearly this is only possible with with sufficient support from the governing body.
But even if the above mentioned...
The WLCG Security Operations Centre Working Group has been working on establishing a common methodology for the use of threat intelligence within the academic research community. A central threat intelligence platform allows working group members to easily exchange indictors of compromise (IoCs) of ongoing security incidents and to use this information to secure their own infrastructures. This...
Network security operations depends on many kings of network security tools to deal with the monitoring, detecting, and responding for security incidents, threats, and vulnerabilities across the organization's infrastructure. However, despite the evolving power of these tools, they are relatively cumbersome to use and often require interaction through specific interfaces, which increases the...
Abstract— As software systems become increasingly complex, defects in source code pose significant security risks, such as user data leakage and malicious intrusions, making their detection crucial. Current approaches based on Graph Neural Networks (GNNs) can partially reveal defect information; however, they suffer from heavy graph construction costs and underutilization of heterogeneous...