UK e-Infrastructure Security & Access Management WG

Last updated: 
1 month 2 weeks ago
Group Manager

At the request of the Research Councils UK e-Infrastructure group, Janet established a working group from 2013-2016 to support those providing and using e-infrastructure services in achieving an approach that both protects services from threats and is usable by practitioners. More detail about the group can be found in the Terms of Reference

The Working Group published the following papers:

Information about the Working Group's activities, as well as discussion documents, links and recommendations is linked under the following categories. Unless marked otherwise, all items are works-in-progress and we very much welcome your comments and contributions.

Meetings   Presentations
Case Studies Discussions Technologies

Andrew Cormack (WG Chair)

Blog Article

I sat in on an interesting session at the CASC-HPCSIG meeting in Oxford last week, looking at different models for university-industry cooperation in high-performance computing. All considered that people, support and expertise are at least as important to a successful liaison as processors, so were slightly puzzled that publicity, bids and even informal discussions tend to focus almost entirely on size of hardware.


This is a little bit of a pre-case-study as the AARC project hasn't even started at the time of writing.

Nevertheless, many projects are starting up and attempt to solve or work around the types of problems that AARC aims to address - either by building on existing work, or by reinventing the wheel and "solving" the problem again.


A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended users, that users can be held accountable for any misuse, and that accounts are disabled when users are no longer entitled to use them. Users face a similar challenge in managing multiple authentication credentials for different on-line services.


E-infrastructures are large computer systems with considerable processing and storage capacity and in some cases, holding valuable or sensitive data. They are therefore likely to be attractive targets for attackers with a wide range of motivations. However, to support international research, e-infrastructures must be accessible to users located anywhere on the Internet. In many cases users will upload and run their own software or virtual machines and exchange large volumes of data over high-speed networks.