DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Security in high-performance computing environments


Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.

  1. Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Univ. of California, Davis, CA (United States)
Publication Date:
Research Org.:
Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC)
Sponsoring Org.:
USDOE Office of Science (SC), Advanced Scientific Computing Research (ASCR)
OSTI Identifier:
Grant/Contract Number:  
Resource Type:
Accepted Manuscript
Journal Name:
Communications of the ACM
Additional Journal Information:
Journal Volume: 60; Journal Issue: 9; Journal ID: ISSN 0001-0782
Association for Computing Machinery
Country of Publication:
United States

Citation Formats

Peisert, Sean. Security in high-performance computing environments. United States: N. p., 2017. Web. doi:10.1145/3096742.
Peisert, Sean. Security in high-performance computing environments. United States.
Peisert, Sean. Sat . "Security in high-performance computing environments". United States.
title = {Security in high-performance computing environments},
author = {Peisert, Sean},
abstractNote = {Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.},
doi = {10.1145/3096742},
journal = {Communications of the ACM},
number = 9,
volume = 60,
place = {United States},
year = {2017},
month = {9}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record

Citation Metrics:
Cited by: 2 works
Citation information provided by
Web of Science

Figures / Tables:

Figure 1 Figure 1: Three typical high-level workflow diagrams of scientific computing. The diagram at top shows a typical workflow for data analysis in HPC; the middle diagram shows a typical workflow for modeling and simulation; and the bottom diagram shows a coupled, interactive compute-visualization workflow.

Save / Share:

Works referenced in this record:

Precimonious: tuning assistant for floating-point precision
conference, January 2013

  • Rubio-González, Cindy; Nguyen, Cuong; Nguyen, Hong Diep
  • Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '13
  • DOI: 10.1145/2503210.2503296

WarpIV: In Situ Visualization and Analysis of Ion Accelerator Simulations
journal, May 2016

  • Rubel, Oliver; Loring, Burlen; Vay, Jean-Luc
  • IEEE Computer Graphics and Applications, Vol. 36, Issue 3
  • DOI: 10.1109/MCG.2016.62

The Medical Science DMZ
journal, May 2016

  • Peisert, Sean; Barnett, William; Dart, Eli
  • Journal of the American Medical Informatics Association, Vol. 23, Issue 6
  • DOI: 10.1093/jamia/ocw032

Human Attention in Visual Question Answering: Do Humans and Deep Networks look at the same regions?
conference, January 2016

  • Das, Abhishek; Agrawal, Harsh; Zitnick, Larry
  • Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing
  • DOI: 10.18653/v1/D16-1092

Multiclass classification of distributed memory parallel computations
journal, February 2013

Identifying HPC codes via performance logs and machine learning
conference, January 2013

  • DeMasi, Orianna; Samak, Taghrid; Bailey, David H.
  • Proceedings of the first workshop on Changing landscapes in HPC security - CLHS '13
  • DOI: 10.1145/2465808.2465812

How to time-stamp a digital document
journal, January 1991

  • Haber, Stuart; Stornetta, W. Scott
  • Journal of Cryptology, Vol. 3, Issue 2
  • DOI: 10.1007/BF00196791

Computing arbitrary functions of encrypted data
journal, March 2010

mOS: an architecture for extreme-scale operating systems
conference, January 2014

  • Wisniewski, Robert W.; Inglett, Todd; Keppel, Pardo
  • Proceedings of the 4th International Workshop on Runtime and Operating Systems for Supercomputers - ROSS '14
  • DOI: 10.1145/2612262.2612263

What Can We Learn Privately?
journal, January 2011

  • Kasiviswanathan, Shiva Prasad; Lee, Homin K.; Nissim, Kobbi
  • SIAM Journal on Computing, Vol. 40, Issue 3
  • DOI: 10.1137/090756090

The Science DMZ: a network design pattern for data-intensive science
conference, January 2013

  • Dart, Eli; Rotman, Lauren; Tierney, Brian
  • Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '13
  • DOI: 10.1145/2503210.2503245

Bro: a system for detecting network intruders in real-time
journal, December 1999

IPython: A System for Interactive Scientific Computing
journal, January 2007

  • Perez, Fernando; Granger, Brian E.
  • Computing in Science & Engineering, Vol. 9, Issue 3
  • DOI: 10.1109/MCSE.2007.53

Osprey: a practical type system for validating dimensional unit correctness of C programs
conference, January 2006

  • Jiang, Lingxiao; Su, Zhendong
  • Proceeding of the 28th international conference on Software engineering - ICSE '06
  • DOI: 10.1145/1134285.1134323

Stalking the wily hacker
journal, May 1988

Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
conference, May 2010

  • Sommer, Robin; Paxson, Vern
  • 2010 IEEE Symposium on Security and Privacy
  • DOI: 10.1109/SP.2010.25

Experiences with User-Centered Design for the Tigres Workflow API
conference, October 2014

  • Ramakrishnan, Lavanya; Poon, Sarah; Hendrix, Valerie
  • 2014 IEEE 10th International Conference on e-Science (e-Science)
  • DOI: 10.1109/eScience.2014.56

CryptDB: processing queries on an encrypted database
journal, September 2012

  • Popa, Raluca Ada; Redfield, Catherine M. S.; Zeldovich, Nickolai
  • Communications of the ACM, Vol. 55, Issue 9
  • DOI: 10.1145/2330667.2330691

Works referencing / citing this record:

Implementing efficient data compression and encryption in a persistent key-value store for HPC
journal, May 2019

  • Kim, Jungwon; Vetter, Jeffrey S.
  • The International Journal of High Performance Computing Applications, Vol. 33, Issue 6
  • DOI: 10.1177/1094342019847264

Figures / Tables found in this record:

    Figures/Tables have been extracted from DOE-funded journal article accepted manuscripts.