A distinctive feature of e-infrastructures is that most individuals’ authorisation to access a particular service does not come from their home organisation (as it does for site-licensed journals, for example) nor from the operator of the service (as in traditional, non-federated, access).
[The final version of this paper has now been published]
A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended users, that users can be held accountable for any misuse, and that accounts are disabled when users are no longer entitled to use them. Users face a similar challenge in managing multiple authentication credentials for different on-line services.
E-infrastructures are large computer systems with considerable processing and storage capacity and in some cases, holding valuable or sensitive data. They are therefore likely to be attractive targets for attackers with a wide range of motivations. However, to support international research, e-infrastructures must be accessible to users located anywhere on the Internet. In many cases users will upload and run their own software or virtual machines and exchange large volumes of data over high-speed networks.
Minutes of the fifth working group meeting, held in London on 23rd January 2015.
Minutes of the fourth working group meeting, held in London on 3rd October 2014.
Minutes of the third working group meeting, held in London on 12th June 2014
Presentation on EGI-CERT activities (agenda item 2.2)
Draft model of a generic e-infrastructure (agenda item 4.1)
Paul Lewis's presentation to our March meeting, which is the background to our discussion of the Cyber-Security Council Top 20 controls at the June meeting.
Minutes of the second working group meeting, held in London on 14th March 2014.
Presentations were made at the meeting on:
At the recent Working Group meeting I presented this diagram, which I've been using to get my head around the various components of an e-infrastructure and how they fit together. It's very much a work in progress: the typefaces show areas I'm reasonably confident of (in Roman) versus those (in Italic) where the implementation, and in some cases even the best combination of functions, are less clear to me. I'm still refining the diagram so comments and suggestions are welcome.
