eIWG papers

20 December 2016 at 3:05pm
While some e-infrastructures included accounting in their design and operations from the start, others are nowbeing asked or required to add accounting support to their existing systems. Typically accounting forms part of arelationship between the infrastructure and some other organisation – perhaps a funder, host or customer –rather than the infrastructure's relationship with its individual users. These organisations may be interested inusage statistics across particular categories: for example by subject, by time, by project or by origin. It might be
20 January 2016 at 11:26am
This document provides an introduction to the work of the UK e-Infrastructure Security and Access Management Working Group and the papers it has published. Members of the group are: Stephen Booth, Edinburgh Parallel Computing Centre Peter Boyle, Edinburgh University David Britton, Glasgow University John Chapman, Jisc Andrew Cormack, Jisc Darren Hankinson, Manchester University Josh Howlett, Jisc Henry Hughes, Jisc Jens Jensen, STFC David Kelsey, STFC Paul Kennedy, Nottingham University
14 January 2016 at 3:17pm
The various organisations participating in an e-infrastructure are likely to have their own policies on its use; harmonising those policies offers an opportunity to implement them more accurately, efficiently and effectively. This paper discusses how policies are likely to interact and how those developing policies can benefit from the coordination provided by using a common infrastructure.
8 June 2015 at 10:54am
A distinctive feature of e-infrastructures is that most individuals’ authorisation to access a particular service does not come from their home organisation (as it does for site-licensed journals, for example) nor from the operator of the service (as in traditional, non-federated, access).
25 March 2015 at 8:55am
A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended users, that users can be held accountable for any misuse, and that accounts are disabled when users are no longer entitled to use them. Users face a similar challenge in managing multiple authentication credentials for different on-line services.
25 March 2015 at 8:51am
E-infrastructures are large computer systems with considerable processing and storage capacity and in some cases, holding valuable or sensitive data. They are therefore likely to be attractive targets for attackers with a wide range of motivations. However, to support international research, e-infrastructures must be accessible to users located anywhere on the Internet. In many cases users will upload and run their own software or virtual machines and exchange large volumes of data over high-speed networks.
25 March 2015 at 9:14am
[The final version of this paper has now been published]
23 April 2014 at 10:23am
I was asked to provide a brief summary of the working group's activities and future work areas for the Research Councils UK's e-Infrastructure group meeting in April 2014.
Subscribe to eIWG papers