Initial Thoughts on Cybersecurity And Reproducibility. Deelman, E., Stodden, V., Taufer, M., & Welch, V. In Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems (P-RECS '19), pages 13-15, 2019. Association for Computing Machinery (ACM). Paper doi abstract bibtex Cybersecurity, which serves to protect computer systems and data from malicious and accidental abuse and changes, both supports and challenges the reproducibility of computational science. This position paper explores a research agenda by enumerating a set of two types of challenges that emerge at the intersection of cybersecurity and reproducibility: challenges that cybersecurity has in supporting the reproducibility of computational science, and challenges cybersecurity creates for reproducibility of computational science.
@inproceedings{
title = {Initial Thoughts on Cybersecurity And Reproducibility},
type = {inproceedings},
year = {2019},
pages = {13-15},
publisher = {Association for Computing Machinery (ACM)},
id = {2f76dbc3-b76e-3785-b8cc-9b880f76d6d5},
created = {2019-09-11T16:05:13.387Z},
accessed = {2019-09-11},
file_attached = {true},
profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},
group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235},
last_modified = {2019-09-11T16:05:13.456Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {false},
hidden = {false},
private_publication = {false},
abstract = {Cybersecurity, which serves to protect computer systems and data from malicious and accidental abuse and changes, both supports and challenges the reproducibility of computational science. This position paper explores a research agenda by enumerating a set of two types of challenges that emerge at the intersection of cybersecurity and reproducibility: challenges that cybersecurity has in supporting the reproducibility of computational science, and challenges cybersecurity creates for reproducibility of computational science.},
bibtype = {inproceedings},
author = {Deelman, Ewa and Stodden, Victoria and Taufer, Michela and Welch, Von},
doi = {10.1145/3322790.3330593},
booktitle = {Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems (P-RECS '19)}
}
Downloads: 0
{"_id":"dvYiBDPM3Bsb2AwtE","bibbaseid":"deelman-stodden-taufer-welch-initialthoughtsoncybersecurityandreproducibility-2019","authorIDs":[],"author_short":["Deelman, E.","Stodden, V.","Taufer, M.","Welch, V."],"bibdata":{"title":"Initial Thoughts on Cybersecurity And Reproducibility","type":"inproceedings","year":"2019","pages":"13-15","publisher":"Association for Computing Machinery (ACM)","id":"2f76dbc3-b76e-3785-b8cc-9b880f76d6d5","created":"2019-09-11T16:05:13.387Z","accessed":"2019-09-11","file_attached":"true","profile_id":"42d295c0-0737-38d6-8b43-508cab6ea85d","group_id":"411048e7-0d47-3d3c-90c2-fad3d2bd6235","last_modified":"2019-09-11T16:05:13.456Z","read":false,"starred":false,"authored":false,"confirmed":false,"hidden":false,"private_publication":false,"abstract":"Cybersecurity, which serves to protect computer systems and data from malicious and accidental abuse and changes, both supports and challenges the reproducibility of computational science. This position paper explores a research agenda by enumerating a set of two types of challenges that emerge at the intersection of cybersecurity and reproducibility: challenges that cybersecurity has in supporting the reproducibility of computational science, and challenges cybersecurity creates for reproducibility of computational science.","bibtype":"inproceedings","author":"Deelman, Ewa and Stodden, Victoria and Taufer, Michela and Welch, Von","doi":"10.1145/3322790.3330593","booktitle":"Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems (P-RECS '19)","bibtex":"@inproceedings{\n title = {Initial Thoughts on Cybersecurity And Reproducibility},\n type = {inproceedings},\n year = {2019},\n pages = {13-15},\n publisher = {Association for Computing Machinery (ACM)},\n id = {2f76dbc3-b76e-3785-b8cc-9b880f76d6d5},\n created = {2019-09-11T16:05:13.387Z},\n accessed = {2019-09-11},\n file_attached = {true},\n profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},\n group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235},\n last_modified = {2019-09-11T16:05:13.456Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {false},\n hidden = {false},\n private_publication = {false},\n abstract = {Cybersecurity, which serves to protect computer systems and data from malicious and accidental abuse and changes, both supports and challenges the reproducibility of computational science. This position paper explores a research agenda by enumerating a set of two types of challenges that emerge at the intersection of cybersecurity and reproducibility: challenges that cybersecurity has in supporting the reproducibility of computational science, and challenges cybersecurity creates for reproducibility of computational science.},\n bibtype = {inproceedings},\n author = {Deelman, Ewa and Stodden, Victoria and Taufer, Michela and Welch, Von},\n doi = {10.1145/3322790.3330593},\n booktitle = {Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems (P-RECS '19)}\n}","author_short":["Deelman, E.","Stodden, V.","Taufer, M.","Welch, V."],"urls":{"Paper":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d/file/290433c4-8123-6f8b-20ec-121ce4d6a71a/full_text.pdf.pdf"},"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibbaseid":"deelman-stodden-taufer-welch-initialthoughtsoncybersecurityandreproducibility-2019","role":"author","metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","creationDate":"2019-09-12T14:38:33.903Z","downloads":0,"keywords":[],"search_terms":["initial","thoughts","cybersecurity","reproducibility","deelman","stodden","taufer","welch"],"title":"Initial Thoughts on Cybersecurity And Reproducibility","year":2019,"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","dataSources":["zgahneP4uAjKbudrQ","ya2CyA73rpZseyrZ8","2252seNhipfTmjEBQ"]}