I sat in on an interesting session at the CASC-HPCSIG meeting in Oxford last week, looking at different models for university-industry cooperation in high-performance computing. All considered that people, support and expertise are at least as important to a successful liaison as processors, so were slightly puzzled that publicity, bids and even informal discussions tend to focus almost entirely on size of hardware.
Minutes of the sixth working group meeting, held in London on 1st May 2015.
A distinctive feature of e-infrastructures is that most individuals’ authorisation to access a particular service does not come from their home organisation (as it does for site-licensed journals, for example) nor from the operator of the service (as in traditional, non-federated, access).
The UK access management federation provides access to services for users based at participating institutions in the UK.
This case study is a brief summary of the process associated with registering a service with the UKAMF and the advantages (and disadvantages) of doing so.
This is a little bit of a pre-case-study as the AARC project hasn't even started at the time of writing.
Nevertheless, many projects are starting up and attempt to solve or work around the types of problems that AARC aims to address - either by building on existing work, or by reinventing the wheel and "solving" the problem again.
[The final version of this paper has now been published]
A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended users, that users can be held accountable for any misuse, and that accounts are disabled when users are no longer entitled to use them. Users face a similar challenge in managing multiple authentication credentials for different on-line services.
E-infrastructures are large computer systems with considerable processing and storage capacity and in some cases, holding valuable or sensitive data. They are therefore likely to be attractive targets for attackers with a wide range of motivations. However, to support international research, e-infrastructures must be accessible to users located anywhere on the Internet. In many cases users will upload and run their own software or virtual machines and exchange large volumes of data over high-speed networks.
Minutes of the fifth working group meeting, held in London on 23rd January 2015.
Minutes of the fourth working group meeting, held in London on 3rd October 2014.
