skip to main content
DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Security in high-performance computing environments

Abstract

Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.

Authors:
 [1]
  1. Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Univ. of California, Davis, CA (United States)
Publication Date:
Research Org.:
Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center
Sponsoring Org.:
USDOE Office of Science (SC), Advanced Scientific Computing Research (ASCR) (SC-21)
OSTI Identifier:
1524065
Grant/Contract Number:  
AC02-05CH11231
Resource Type:
Accepted Manuscript
Journal Name:
Communications of the ACM
Additional Journal Information:
Journal Volume: 60; Journal Issue: 9; Journal ID: ISSN 0001-0782
Publisher:
Association for Computing Machinery
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Peisert, Sean. Security in high-performance computing environments. United States: N. p., 2017. Web. doi:10.1145/3096742.
Peisert, Sean. Security in high-performance computing environments. United States. doi:10.1145/3096742.
Peisert, Sean. Sat . "Security in high-performance computing environments". United States. doi:10.1145/3096742. https://www.osti.gov/servlets/purl/1524065.
@article{osti_1524065,
title = {Security in high-performance computing environments},
author = {Peisert, Sean},
abstractNote = {Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.},
doi = {10.1145/3096742},
journal = {Communications of the ACM},
number = 9,
volume = 60,
place = {United States},
year = {2017},
month = {9}
}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record

Citation Metrics:
Cited by: 1 work
Citation information provided by
Web of Science

Save / Share:

Works referenced in this record:

Precimonious: tuning assistant for floating-point precision
conference, January 2013

  • Rubio-González, Cindy; Nguyen, Cuong; Nguyen, Hong Diep
  • Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '13
  • DOI: 10.1145/2503210.2503296

WarpIV: In Situ Visualization and Analysis of Ion Accelerator Simulations
journal, May 2016

  • Rubel, Oliver; Loring, Burlen; Vay, Jean-Luc
  • IEEE Computer Graphics and Applications, Vol. 36, Issue 3
  • DOI: 10.1109/MCG.2016.62

The Science DMZ: a network design pattern for data-intensive science
conference, January 2013

  • Dart, Eli; Rotman, Lauren; Tierney, Brian
  • Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '13
  • DOI: 10.1145/2503210.2503245

Bro: a system for detecting network intruders in real-time
journal, December 1999


IPython: A System for Interactive Scientific Computing
journal, January 2007

  • Perez, Fernando; Granger, Brian E.
  • Computing in Science & Engineering, Vol. 9, Issue 3
  • DOI: 10.1109/MCSE.2007.53

The Medical Science DMZ
journal, May 2016

  • Peisert, Sean; Barnett, William; Dart, Eli
  • Journal of the American Medical Informatics Association, Vol. 23, Issue 6
  • DOI: 10.1093/jamia/ocw032

Human Attention in Visual Question Answering: Do Humans and Deep Networks look at the same regions?
conference, January 2016

  • Das, Abhishek; Agrawal, Harsh; Zitnick, Larry
  • Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing
  • DOI: 10.18653/v1/D16-1092

Multiclass classification of distributed memory parallel computations
journal, February 2013


Osprey: a practical type system for validating dimensional unit correctness of C programs
conference, January 2006

  • Jiang, Lingxiao; Su, Zhendong
  • Proceeding of the 28th international conference on Software engineering - ICSE '06
  • DOI: 10.1145/1134285.1134323

Stalking the wily hacker
journal, May 1988


Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
conference, May 2010

  • Sommer, Robin; Paxson, Vern
  • 2010 IEEE Symposium on Security and Privacy
  • DOI: 10.1109/SP.2010.25

Identifying HPC codes via performance logs and machine learning
conference, January 2013

  • DeMasi, Orianna; Samak, Taghrid; Bailey, David H.
  • Proceedings of the first workshop on Changing landscapes in HPC security - CLHS '13
  • DOI: 10.1145/2465808.2465812

How to time-stamp a digital document
journal, January 1991

  • Haber, Stuart; Stornetta, W. Scott
  • Journal of Cryptology, Vol. 3, Issue 2
  • DOI: 10.1007/BF00196791

Computing arbitrary functions of encrypted data
journal, March 2010


Experiences with User-Centered Design for the Tigres Workflow API
conference, October 2014

  • Ramakrishnan, Lavanya; Poon, Sarah; Hendrix, Valerie
  • 2014 IEEE 10th International Conference on e-Science (e-Science)
  • DOI: 10.1109/eScience.2014.56

CryptDB: processing queries on an encrypted database
journal, September 2012

  • Popa, Raluca Ada; Redfield, Catherine M. S.; Zeldovich, Nickolai
  • Communications of the ACM, Vol. 55, Issue 9
  • DOI: 10.1145/2330667.2330691

mOS: an architecture for extreme-scale operating systems
conference, January 2014

  • Wisniewski, Robert W.; Inglett, Todd; Keppel, Pardo
  • Proceedings of the 4th International Workshop on Runtime and Operating Systems for Supercomputers - ROSS '14
  • DOI: 10.1145/2612262.2612263

What Can We Learn Privately?
journal, January 2011

  • Kasiviswanathan, Shiva Prasad; Lee, Homin K.; Nissim, Kobbi
  • SIAM Journal on Computing, Vol. 40, Issue 3
  • DOI: 10.1137/090756090