2017 (7)
The Rise of Cybersecurity and Its Impact on Data Protection. Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynskey, O.; and Millard, C. International Data Privacy Law, 7(2): 73-75. 2017.
bibtex
Pervasive Technology Institute Annual Report: Research Innovations and Advanced Cyberinfrastructure Services in Support of IU Strategic Goals During FY 2017. Stewart, C.; Plale, B.; Welch, V.; Pierce, M.; Fox, G., C.; Doak, T., G.; Hancock, D., Y.; Henschel, R.; Link, M., R.; and Miller, T. Technical Report 2017.
bibtex
The medical science DMZ: a network design pattern for data-intensive medical science. Peisert, S.; Dart, E.; Barnett, W.; Balas, E.; Cuff, J.; Grossman, R., L.; Berman, A.; Shankar, A.; and Tierney, B. Journal of the American Medical Informatics Association. 2017.
bibtex
Bulk Collection: Systematic Government Access to Private-Sector Data. Cate, F., H.; and Dempsey, J., X. Oxford University Press, 2017.
bibtex   buy
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity. Peisert, S.; and Welch, V. IEEE Security and Privacy, 15(5): 94-95. 2017.
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity [link]Website   bibtex   abstract
Indiana University Pervasive Technology Institute. Stewart, C., A.; Welch, V.; Plale, B.; Fox, G., C.; Pierce, M.; and Sterling, T. Technical Report 2017.
bibtex
Machine Learning with Personal Data: Is Data Protection Law Smart Enough to Meet the Challenge?. Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynskey, O.; and Millard, C. International Data Privacy Law,, 7(1): 1-2. 2017.
bibtex
  2016 (9)
Modeling the Past and Future of Identity Management for Scientific Collaborations. Cowles, R.; Jackson, C.; and Welch, V. In Proceedings of the International Symposium on Grids and Clouds (ISGC) 2016. 13-18 March 2016. Academia Sinica, Taipei, Taiwan. Online at http://pos. sissa. it/cgi-bin/reader/conf. cgi? confid= 270, id. 14, 2016.
bibtex
A Time of Turmoil. Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynsky, O.; and Millard, C. International Data Privacy Law, 6(1): 1-3. 2016.
bibtex
SciGaP-CTSC Engagement Summary. Heiland, R.; Koranda, S.; and Welch, V. Technical Report 2016.
bibtex
The Language of Data Privacy Law (and How It Differs from Reality). Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynskey, O.; and Millard, C. International Data Privacy Law, 4(1): 259-269. 2016.
bibtex
Center for Trustworthy Scientific Cyberinfrastructure-The NSF Cybersecurity Center of Excellence: Year One Report. Welch, V. Technical Report 2016.
bibtex
PKI-ASAF Design Documents. Welch, V.; Heiland, R.; Garrison III, W., C.; and Lee, A., J. Technical Report 2016.
bibtex
The Global Data Protection Implications of" Brexit". Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynskey, O.; and Millard, C. International Data Privacy Law, 6(3): 167-169. 2016.
bibtex
The Report of the 2016 Cybersecurity Summit for Large Facilities and Cyberinfrastructure: Strengthening Trustworthy Science. Marsteller, J.; Welch, V.; and Starzynski Coddens, A. Technical Report 2016.
bibtex
The Medical Science DMZ. Peisert, S.; Barnett, W.; Dart, E.; Cuff, J.; Grossman, R., L.; Balas, E.; Berman, A.; Shankar, A.; and Tierney, B. Journal of the American Medical Informatics Association, 23(6): 1199-1201. 2016.
bibtex
  2015 (9)
Protecting Privacy in Big Data. Cate, F., H. 경제규제와 법, 8(1): 7-20. 2015.
bibtex
Authentication and authorization considerations for a multi-tenant service. Heiland, R.; Koranda, S.; Marru, S.; Pierce, M.; and Welch, V. In SCREAM 2015 - Proceedings of the 2015 Workshop on the Science of Cyberinfrastructure: Research, Experience, Applications and Models, Part of HPDC 2015, pages 29-35, 2015. Association for Computing Machinery, Inc
Authentication and authorization considerations for a multi-tenant service [link]Website   bibtex   abstract
Facilitating scientific collaborations by delegating identity management: Reducing barriers & roadmap for incremental implementation. Cowles, R.; Jackson, C.; and Welch, V. In CLHS 2015 - Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, Part of HPDC 2015, pages 15-19, 2015. Association for Computing Machinery, Inc
Facilitating scientific collaborations by delegating identity management: Reducing barriers & roadmap for incremental implementation [link]Website   bibtex   abstract
Sustained Software for Cyberinfrastructure-Analyses of Successful Efforts with a Focus on NSF-funded Software. Stewart, C., A. SCREAM '15. 2015.
bibtex   abstract
Internet Balkanization Gathers Pace: Is Privacy the Real Driver?. Cate, F., H.; Kuner, C.; Millard, C.; Svantesson, D., J., B.; and Lynskey, O. International Data Privacy Law, 5(1): 1-2. 2015.
bibtex
Risk Management in Data Protection. Cate, F., H.; Kuner, C.; Millard, C.; Svantesson, D., J., B.; and Lynskey, O. International Data Privacy Law, 5(2): 95-98. 2015.
bibtex
Center for Applied Cybersecurity Research: 2015 Annual Report and Strategic Plan (2015-2020). Delaney, D., G.; Welch, V.; and Starzynski Coddens, A. Technical Report 2015.
bibtex
The Data Protection Credibility Crisis. Cate, F., H.; Kuner, C.; Millard, C.; Svantesson, D., J., B.; and Lynskey, O. International Data Privacy Law, 5: 3. 2015.
bibtex
XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations. Cowles, R.; Jackson, C.; and Welch, V. Technical Report Indiana University, 9 2015.
XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations [link]Website   bibtex
  2014 (14)
Sustainability of cyberinfrastructure software: Community needs, case studies, and success strategies. Stewart, C., A.; Barnett, W., K.; Wernert, E., A.; Wernert, J., A.; Welch, V.; and Knepper, R. Technical Report 2014.
bibtex
Taking Stock After Four Years. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 4(2). 2014.
bibtex
The Case for an Open and Evolving Software Assurance Framework. Livny, M.; Miller, B., P.; and Welch, V. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP), pages 1, 2014. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)
bibtex
Report of the 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure Large Facility Cybersecurity Challenges and Responses August 26‐August 28. Jackson, C.; Marsteller, J.; and Welch, V. Technical Report 2014.
bibtex
Globus Data Sharing: Security Assessment. Heiland, R.; Koranda, S.; and Welch, V. Technical Report 2014.
bibtex
When Two Worlds Collide: The Interface Between Competition Law and Data Protection. Cate, F., H.; Kuner, C.; Millard, C.; Svantesson, D., J., B.; and Lynskey, O. International Data Privacy Law, 4(4): 247-248. 2014.
bibtex
The role of the collaboratory in enabling large-scale identity management for HEP. Cowles, R.; Jackson, C.; and Welch, V. Journal of Physics: Conference Series, 513(TRACK 3). 2014.
The role of the collaboratory in enabling large-scale identity management for HEP [link]Website   bibtex   abstract
A model for identity management in future scientific collaboratories. Cowles, R.; Jackson, C.; Welch, V.; and Cholia, S. In Proceedings of Science, volume 23-28-Marc, 2014. Proceedings of Science (PoS)
A model for identity management in future scientific collaboratories [link]Website   bibtex   abstract
Systematic Government Access to Private-Sector Data Redux. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law. 2014.
bibtex
OSG PKI transition: Experiences and lessons learned. Welch, V.; Deximo, A.; Hayashi, S.; Khadke, V., D.; Mathure, R.; Quick, R.; Altunay, M.; Sehgal, C., S.; Tiradani, A.; and Basney, J. In Proceedings of Science, volume 23-28-Marc, 2014. Proceedings of Science (PoS)
OSG PKI transition: Experiences and lessons learned [link]Website   bibtex   abstract
Report of the 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure. Jackson, C.; Marsteller, J.; and Welch, V. Technical Report 2014.
bibtex
Report of the 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities: Designing Cybersecurity Programs in Support of Science. Jackson, C.; Marsteller, J.; and Welch, V. Technical Report 2014.
bibtex
The (Data Privacy) Law Hasn't Even Checked in When Technology Takes Off. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 4(3): 175-176. 2014.
bibtex
Building a data sharing model for global genomic research. Kosseim, P.; Dove, E., S.; Baggaley, C.; Meslin, E., M.; Cate, F., H.; Kaye, J.; Harris, J., R.; and Knoppers, B., M. Genome biology, 15(8): 430. 2014.
bibtex
  2013 (15)
PRISM and Privacy: Will This Change Everything?. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 3(4): 217-219. 2013.
bibtex
The Business of Privacy. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law. 2013.
bibtex
Initial findings from a study of best practices and models for cyberinfrastructure software sustainability. Stewart, C., A.; Wernert, J.; Wernert, E., A.; Barnett, W., K.; and Welch, V. arXiv preprint arXiv:1309.1817. 2013.
bibtex
CyberGIS-CTSC Engagement Final Report. Butler, R.; Fleury, T.; Marsteller, J.; and Welch, V. Technical Report 2013.
bibtex
Data protection principles for the 21st century. Cate, F., H.; Cullen, P.; and Mayer-Schonberger, V. Microsoft Corporaton, 2013.
bibtex   buy
Identity management factors for HEP virtual organizations. Cowles, R.; Jackson, C.; and Welch, V. In 20th International Conference on Computing in High Energy and Nuclear Physics (CHEP2013), 2013.
bibtex
Face-to-Data--Another Developing Privacy Threat?. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law. 2013.
bibtex
Science gateway security recommendations. Basney, J.; and Welch, V. In Proceedings - IEEE International Conference on Cluster Computing, ICCC, 2013.
Science gateway security recommendations [link]Website   bibtex   abstract
Status, Strategies and Future Plans-OSG PKI Transition. Welch, V. Technical Report 2013.
bibtex
Toward a Research Software Security Maturity Model. Heiland, R.; Thomas, B.; Welch, V.; and Jackson, C. arXiv preprint arXiv:1309.1677. 2013.
bibtex
Year 1 Report: Center for Trustworthy Scientific Cyberinfrastructure. Welch, V. Technical Report Indiana University, 10 2013.
Year 1 Report: Center for Trustworthy Scientific Cyberinfrastructure [link]Website   bibtex   abstract
The Extraterritoriality of Data Privacy Laws--An Explosive Issue Yet to Detonate. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 3(3): 147-148. 2013.
bibtex
HIPAA and Advanced Scientific Computing. Shankar, A.; and Barnett, W. Technical Report 2013.
bibtex
Notice and Consent in a World of Big Data. Cate, F., H.; and Mayer-Schonberger, V. International Data Privacy Law, 3: 67-73. 2013.
Notice and Consent in a World of Big Data [link]Website   bibtex
Identity management for virtual organizations: An experience-based model. Cowles, R.; Jackson, C.; and Welch, V. In Proceedings - IEEE 9th International Conference on e-Science, e-Science 2013, pages 278-284, 2013. IEEE Computer Society
Identity management for virtual organizations: An experience-based model [link]Website   bibtex   abstract
  2012 (10)
Globus Online Security Review. Welch, V. Technical Report 2012.
bibtex
OSG Certificate Authority Implementation Plan. Welch, V. Technical Report 2012.
bibtex
PRIVACY, CONSUMER CREDIT, AND THE. Cate, F., H. The Impact of Public Policy on Consumer Credit,229. 2012.
bibtex
The commodification of information and the control of expression. Cate, F., H. Amicus Curiae, 2002(43): 3-7. 2012.
bibtex
The Supreme Court and information privacy. Cate, F., H.; and Cate, B., E. International Data Privacy Law, 2(4): 255-267. 2012.
bibtex
Security at the Cyber Border: Exploring Cybersecurity for International Research Network Connections. Welch, V.; Pearson, D.; Tierney, B.; and Williams, J. Technical Report 2012.
bibtex
The End of the Beginning. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 2(3): 115-116. 2012.
bibtex
The Intricacies of Independence. Cate, F., H.; Kuner, C.; Millard, C.; and Svantession, D., J., B. International Data Privacy Law, 2(1): 1-2. 2012.
bibtex
OSG DigiCert Pilot Report. Altunay, M.; Basney, J.; Fischer, J.; Sehgal, C.; and Welch, V. Technical Report 2012.
bibtex
  2011 (12)
A roadmap for using NSF cyberinfrastructure with InCommon. Barnett, W.; Welch, V.; Walsh, A.; and Stewart, C., A. Technical Report 2011.
bibtex
Cyberinfrastructure usage modalities on the TeraGrid. Katz, D., S.; Hart, D.; Jordan, C.; Majumdar, A.; Navarro, J., P.; Smith, W.; Towns, J.; Welch, V.; and Wilkins-Diehr, N. In IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum, pages 932-939, 2011.
Cyberinfrastructure usage modalities on the TeraGrid [link]Website   bibtex   abstract
Indiana University's Advanced Cyberinfrastructure. Arenson, A.; Boyles, M.; Cruise, R.; Gopu, A.; Hart, D.; Lindenlaub, P.; Papakhian, M.; Samuel, J.; Seiffert, K.; and Shankar, A. Technical Report 2011.
bibtex
Let's Not Kill All the Privacy Laws (and Lawyers). Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 1(4). 2011.
bibtex
A Roadmap for Using NSF Cyberinfrastructure with InCommon: Abbreviated Version. Barnett, W.; Welch, V.; Walsh, A.; and Stewart, C., A. Technical Report 2011.
bibtex
A Transatlantic Convergence on Privacy?. Cate, F., H. IEEE Security & Privacy, 9(1): 76-79. 2011.
bibtex
Report of NSF Workshop Series on Scientific Software Security Innovation Institute. Butler, R.; Welch, V.; Basney, J.; Koranda, S.; Barnett, W., K.; and Pearson, D. Technical Report 2011.
bibtex
Moving Forward Together. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 1(2): 81-82. 2011.
bibtex
Privacy--An Elusive Concept. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 1(3). 2011.
bibtex
Overview of NSF ACCI Task Force on Campus Bridging Report. Stewart, C., A.; and Welch, V. Technical Report 2011.
bibtex
Campus Bridging: Software & Software Service Issues Workshop Report. McGee, J.; Welch, V.; and Almes, G., T. Technical Report 2011.
bibtex
An analysis of the benefits and risks to LIGO when participating in identity federations. Basney, J.; Koranda, S.; and Welch, V. LIGO document number LIGOG1100964v2, September. 2011.
bibtex
  2010 (2)
The limits of notice and choice. Cate, F., H. IEEE Security & Privacy, 8(2). 2010.
bibtex
Protecting privacy in health research: the limits of individual choice. Cate, F., H. California Law Review,1765-1803. 2010.
bibtex
  2009 (3)
Updating Data Protection: Part I--Identifying the Objectives. Cate, F., H. Published by the Centre for Information Policy Leadership. 2009.
bibtex
Security, privacy, and the role of law. Cate, F., H. IEEE Security & Privacy, 7(5). 2009.
bibtex
Dos and Don'ts of Data Breach and Information Security Policy. Cate, F., H.; Abrams, M., E.; Bruening, P., J.; and Swindle, O. Published by the Centre for Information Policy Leadership. 2009.
bibtex
  2008 (1)
TeraGrid: Analysis of organization, system architecture, and middleware enabling new types of applications. Catlett, C.; Allcock, W.; Andrews, P.; Aydt, R.; Bair, R.; Balac, N.; Banister, B.; Barker, T.; Bartelt, M.; Beckman, P.; Berman, F.; Bertoline, G.; Blatecky, A.; Boisseau, J.; Bottum, J.; Brunett, S.; Bunn, J.; Butler, M.; Carver, D.; Cobb, J.; Cockerill, T.; Couvares, P.; Dahan, M.; Diehl, D.; Dunning, T.; Foster, I.; Gaither, K.; Gannon, D.; Goasguen, S.; Grobe, M.; Hart, D.; Heinzel, M.; Hempel, C.; Huntoon, W.; Insley, J.; Jordan, C.; Judson, I.; Kamrath, A.; Karonis, N.; Kesselman, C.; Kovatch, P.; Lane, L.; Lathrop, S.; Levine, M.; Lifka, D.; Liming, L.; Livny, M.; Loft, R.; Marcusiu, D.; Marsteller, J.; Martin, S.; McCaulay, S.; McGee, J.; McGinnis, L.; McRobbie, M.; Messina, P.; Moore, R.; Moore, R.; Navarro, J.; Nichols, J.; Papka, M.; Pennington, R.; Pike, G.; Pool, J.; Reddy, R.; Reed, D.; Rimovsky, T.; Roberts, E.; Roskies, R.; Sanielevici, S.; Scott, J.; Shankar, A.; Sheddon, M.; Showerman, M.; Simmel, D.; Singer, A.; Skow, D.; Smallen, S.; Smith, W.; Song, C.; Stevens, R.; Stewart, C.; Stock, R.; Stone, N.; Towns, J.; Urban, T.; Vildibill, M.; Walker, E.; Welch, V.; Wilkins-Diehr, N.; Williams, R.; Winkler, L.; Zhao, L.; and Zimmerman, A. Volume 16 2008.
bibtex   abstract   buy
  2006 (1)
The introduction of the OSCAR database API (ODA). Kim, D.; Squyres, J., M.; and Lumsdaine, A. In High-Performance Computing in an Advanced Collaborative Environment, 2006. HPCS 2006. 20th International Symposium on, pages 39, 2006. IEEE
bibtex
  2005 (1)
Revamping the OSCAR database: A flexible approach to cluster configuration data management. Kim, D.; Squyres, J., M.; and Lumsdaine, A. In High Performance Computing Systems and Applications, 2005. HPCS 2005. 19th International Symposium on, pages 326-332, 2005. IEEE
bibtex
  2003 (2)
University Information Technology Services' Advanced IT Facilities: The least every researcher needs to know. Cruise, R.; Hart, D.; Papakhian, M.; Repasky, R.; Samuel, J.; Shankar, A.; Stewart, C., A.; and Wernert, E. Technical Report 2003.
bibtex
2003 Report on Indiana University Accomplishments supported by Shared University Research Grants from IBM, Inc. Stewart, C., A.; Papakhian, M.; Hart, D.; Shankar, A.; Arenson, A.; McMullen, D., F.; Palakal, M.; Dalkilic, M.; and Ortoleva, P. Technical Report 2003.
bibtex
  2002 (1)
INGEN's advanced IT facilities: The least you need to know. Cruise, R.; Hart, D.; Papakhian, M.; Repasky, R.; Samuel, J.; Shankar, A.; Stewart, C., A.; and Wernert, E. Technical Report 2002.
bibtex
  2000 (1)
Research and Academic Computing Implementation Plan. Peebles, C., S.; Stewart, C., A.; Bernbom, G.; McMullen, D., F.; Shankar, A.; Samuel, J.; Daniels, J.; Papakhian, M.; Hart, D.; and Walsh, J. Technical Report 2000.
bibtex