Categories
Publications

UK e-Infrastructure Security & Access Management WG

At the request of the Research Councils UK e-Infrastructure group, Janet established a working group from 2013-2016 to support those providing and using e-infrastructure services in achieving an approach that both protects services from threats and is usable by practitioners. More detail about the group can be found in the Terms of Reference. The Working […]

Categories
Publications

Accounting and e-Infrastructures

While some e-infrastructures included accounting in their design and operations from the start, others are now being asked or required to add accounting support to their existing systems. Typically accounting forms part of a relationship between the infrastructure and some other organisation – perhaps a funder, host or customer – rather than the infrastructure’s relationship […]

Categories
Publications

e-Infrastructures: Access and Security

This document provides an introduction to the work of the UK e-Infrastructure Security and Access Management Working Group and the papers it has published. JR0059_E-INFRASTRUCTURES_WORKING_GROUP_SUMMARY Members of the group are: Stephen Booth, Edinburgh Parallel Computing Centre Peter Boyle, Edinburgh University David Britton, Glasgow University John Chapman, Jisc (Secretary) Andrew Cormack, Jisc (Chair) Darren Hankinson, Manchester […]

Categories
Publications

Policies for e-Infrastructures

The various organisations participating in an e-infrastructure are likely to have their own policies on its use; harmonising those policies offers an opportunity to implement them more accurately, efficiently and effectively. This paper discusses how policies are likely to interact and how those developing policies can benefit from the coordination provided by using a common […]

Categories
Publications

Authorisation/Group Management for E-Infrastructures

A distinctive feature of e-infrastructures is that most individuals’ authorisation to access a particular service does not come from their home organisation (as it does for site-licensed journals, for example) nor from the operator of the service (as in traditional, non-federated, access). Instead, authorisation is largely devolved by service owners to individuals who act as […]

Categories
Publications

Federated Authentication for E-infrastructures

A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended users, that users can be held accountable for any misuse, and that accounts are disabled when users are no longer entitled to use them. Users face a similar challenge in managing […]

Categories
Publications

Technical Security for E-infrastructures

E-infrastructures are large computer systems with considerable processing and storage capacity and in some cases, holding valuable or sensitive data. They are therefore likely to be attractive targets for attackers with a wide range of motivations. However, to support international research, e-infrastructures must be accessible to users located anywhere on the Internet. In many cases […]