DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Security in high-performance computing environments

Journal Article · · Communications of the ACM
DOI: https://doi.org/10.1145/3096742 · OSTI ID:1524065
 [1]
  1. Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Univ. of California, Davis, CA (United States)

Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.

Research Organization:
Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC)
Sponsoring Organization:
USDOE Office of Science (SC), Advanced Scientific Computing Research (ASCR)
Grant/Contract Number:
AC02-05CH11231
OSTI ID:
1524065
Journal Information:
Communications of the ACM, Vol. 60, Issue 9; ISSN 0001-0782
Publisher:
Association for Computing MachineryCopyright Statement
Country of Publication:
United States
Language:
English
Citation Metrics:
Cited by: 18 works
Citation information provided by
Web of Science

References (26)

Precimonious: tuning assistant for floating-point precision
  • Rubio-González, Cindy; Nguyen, Cuong; Nguyen, Hong Diep
  • Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '13 https://doi.org/10.1145/2503210.2503296
conference January 2013
WarpIV: In Situ Visualization and Analysis of Ion Accelerator Simulations journal May 2016
Automatic event-stream notarization using digital signatures book January 1997
Early Experiences with KTAU on the IBM BG/L book January 2006
The Medical Science DMZ journal May 2016
Human Attention in Visual Question Answering: Do Humans and Deep Networks look at the same regions? conference January 2016
Multiclass classification of distributed memory parallel computations journal February 2013
ASCR Cybersecurity for Scientific Computing Integrity - Research Pathways and Ideas Workshop report June 2015
Identifying HPC codes via performance logs and machine learning conference January 2013
How to time-stamp a digital document journal January 1991
Computing arbitrary functions of encrypted data journal March 2010
mOS: an architecture for extreme-scale operating systems
  • Wisniewski, Robert W.; Inglett, Todd; Keppel, Pardo
  • Proceedings of the 4th International Workshop on Runtime and Operating Systems for Supercomputers - ROSS '14 https://doi.org/10.1145/2612262.2612263
conference January 2014
What Can We Learn Privately? journal January 2011
The Science DMZ: a network design pattern for data-intensive science
  • Dart, Eli; Rotman, Lauren; Tierney, Brian
  • Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '13 https://doi.org/10.1145/2503210.2503245
conference January 2013
Bro: a system for detecting network intruders in real-time journal December 1999
IPython: A System for Interactive Scientific Computing journal January 2007
Osprey: a practical type system for validating dimensional unit correctness of C programs conference January 2006
Stalking the wily hacker journal May 1988
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection conference May 2010
ASCR Cybersecurity for Scientific Computing Integrity report February 2015
Fingerprinting Communication and Computation on HPC Machines report June 2010
UEPS — A second generation electronic wallet book January 1992
Experiences with User-Centered Design for the Tigres Workflow API conference October 2014
CryptDB: processing queries on an encrypted database journal September 2012
Differential Privacy book January 2006
Improving the trust in results of numerical simulations and scientific data analytics report April 2015

Cited By (1)

Implementing efficient data compression and encryption in a persistent key-value store for HPC journal May 2019

Figures / Tables (2)