Security in high-performance computing environments
Abstract
Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.
- Authors:
-
- Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Univ. of California, Davis, CA (United States)
- Publication Date:
- Research Org.:
- Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center
- Sponsoring Org.:
- USDOE Office of Science (SC), Advanced Scientific Computing Research (ASCR)
- OSTI Identifier:
- 1524065
- Grant/Contract Number:
- AC02-05CH11231
- Resource Type:
- Accepted Manuscript
- Journal Name:
- Communications of the ACM
- Additional Journal Information:
- Journal Volume: 60; Journal Issue: 9; Journal ID: ISSN 0001-0782
- Publisher:
- Association for Computing Machinery
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING
Citation Formats
Peisert, Sean. Security in high-performance computing environments. United States: N. p., 2017.
Web. doi:10.1145/3096742.
Peisert, Sean. Security in high-performance computing environments. United States. doi:10.1145/3096742.
Peisert, Sean. Sat .
"Security in high-performance computing environments". United States. doi:10.1145/3096742. https://www.osti.gov/servlets/purl/1524065.
@article{osti_1524065,
title = {Security in high-performance computing environments},
author = {Peisert, Sean},
abstractNote = {Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.},
doi = {10.1145/3096742},
journal = {Communications of the ACM},
number = 9,
volume = 60,
place = {United States},
year = {2017},
month = {9}
}
Other availability
Cited by: 2 works
Citation information provided by
Web of Science
Web of Science
Figures / Tables:

All figures and tables
(2 total)
Save to My Library
You must Sign In or Create an Account in order to save documents to your library.
Works referenced in this record:
Precimonious: tuning assistant for floating-point precision
conference, January 2013
- Rubio-González, Cindy; Nguyen, Cuong; Nguyen, Hong Diep
- Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '13
WarpIV: In Situ Visualization and Analysis of Ion Accelerator Simulations
journal, May 2016
- Rubel, Oliver; Loring, Burlen; Vay, Jean-Luc
- IEEE Computer Graphics and Applications, Vol. 36, Issue 3
The Medical Science DMZ
journal, May 2016
- Peisert, Sean; Barnett, William; Dart, Eli
- Journal of the American Medical Informatics Association, Vol. 23, Issue 6
Human Attention in Visual Question Answering: Do Humans and Deep Networks look at the same regions?
conference, January 2016
- Das, Abhishek; Agrawal, Harsh; Zitnick, Larry
- Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing
Multiclass classification of distributed memory parallel computations
journal, February 2013
- Whalen, Sean; Peisert, Sean; Bishop, Matt
- Pattern Recognition Letters, Vol. 34, Issue 3
Identifying HPC codes via performance logs and machine learning
conference, January 2013
- DeMasi, Orianna; Samak, Taghrid; Bailey, David H.
- Proceedings of the first workshop on Changing landscapes in HPC security - CLHS '13
How to time-stamp a digital document
journal, January 1991
- Haber, Stuart; Stornetta, W. Scott
- Journal of Cryptology, Vol. 3, Issue 2
Computing arbitrary functions of encrypted data
journal, March 2010
- Gentry, Craig
- Communications of the ACM, Vol. 53, Issue 3
mOS: an architecture for extreme-scale operating systems
conference, January 2014
- Wisniewski, Robert W.; Inglett, Todd; Keppel, Pardo
- Proceedings of the 4th International Workshop on Runtime and Operating Systems for Supercomputers - ROSS '14
What Can We Learn Privately?
journal, January 2011
- Kasiviswanathan, Shiva Prasad; Lee, Homin K.; Nissim, Kobbi
- SIAM Journal on Computing, Vol. 40, Issue 3
The Science DMZ: a network design pattern for data-intensive science
conference, January 2013
- Dart, Eli; Rotman, Lauren; Tierney, Brian
- Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '13
Bro: a system for detecting network intruders in real-time
journal, December 1999
- Paxson, Vern
- Computer Networks, Vol. 31, Issue 23-24
IPython: A System for Interactive Scientific Computing
journal, January 2007
- Perez, Fernando; Granger, Brian E.
- Computing in Science & Engineering, Vol. 9, Issue 3
Osprey: a practical type system for validating dimensional unit correctness of C programs
conference, January 2006
- Jiang, Lingxiao; Su, Zhendong
- Proceeding of the 28th international conference on Software engineering - ICSE '06
Stalking the wily hacker
journal, May 1988
- Stoll, Clifford
- Communications of the ACM, Vol. 31, Issue 5
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
conference, May 2010
- Sommer, Robin; Paxson, Vern
- 2010 IEEE Symposium on Security and Privacy
Experiences with User-Centered Design for the Tigres Workflow API
conference, October 2014
- Ramakrishnan, Lavanya; Poon, Sarah; Hendrix, Valerie
- 2014 IEEE 10th International Conference on e-Science (e-Science)
CryptDB: processing queries on an encrypted database
journal, September 2012
- Popa, Raluca Ada; Redfield, Catherine M. S.; Zeldovich, Nickolai
- Communications of the ACM, Vol. 55, Issue 9
Works referencing / citing this record:
Implementing efficient data compression and encryption in a persistent key-value store for HPC
journal, May 2019
- Kim, Jungwon; Vetter, Jeffrey S.
- The International Journal of High Performance Computing Applications, Vol. 33, Issue 6
Figures/Tables have been extracted from DOE-funded journal article accepted manuscripts.