Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3437359.3465577acmconferencesArticle/Chapter ViewAbstractPublication PagespearcConference Proceedingsconference-collections
research-article
Open access

Secure Research Infrastructure Using tiCrypt

Published: 17 July 2021 Publication History

Abstract

Digital data is increasingly important and becoming more prevalent in research. As such, a significant and growing fraction of that data is subject to complex security and privacy standards for its storage and processing. With the introduction of contractual requirements for NIST Special Publication 800-171 and other compliance frameworks, universities are under expanded pressure to secure research infrastructure to ensure their researchers comply with laws, regulations, and contractual requirements.
The University of Florida developed tiCrypt, a bundled security middleware product, and implemented their ResVault system to meet the growing need for secure research infrastructure. The University of Maryland and Princeton University, both seeking to meet compliance requirements for secure research, have also implemented systems using tiCrypt. As new institutions adopt tiCrypt, the Tera Insights development team continues to add functionality to meet the needs of a broad range of research workflows.

References

[1]
2018. Health Insurance Portability and Accountability Act of 1996. https://www.cdc.gov/phlp/publications/topic/hipaa.html
[2]
2020. Federal Student Aid: Protecting Student Information ? Compliance with CUI and GLBA. Retrieved March 08, 2021 from https://ifap.ed.gov/electronic-announcements/121820CybersecurityProtectStudentInfoComplianceCUInGLBA
[3]
2021. Coleridge Initiative, NYU. https://coleridgeinitiative.org/
[4]
2021. Federal Information Security Modernization Act. https://www.cisa.gov/federal-information-security-modernization-act
[5]
2021. Fragile Families. https://fragilefamilies.princeton.edu/
[6]
2021. NJ Families Study. https://njfamilies.princeton.edu/index.html
[7]
2021. Princeton Institute for Computational Science and Engineering. https://researchcomputing.princeton.edu/about/about-picscie
[8]
2021. Princeton University Research Computing. https://researchcomputing.princeton.edu
[9]
2021. RHEDCloud. https://www.rhedcloud.org/
[10]
2021. RightScale. https://www.flexera.com
[11]
2021. Springdale Linux. http://springdale.math.ias.edu/
[12]
2021. Tera Insights. https://terainsights.com/
[13]
2021. Tera Insights. https://ticrypt.com/
[14]
2021. University of Florida Research Computing. https://www.rc.ufl.edu/
[15]
Billy Mitchell. 2020. GSA considering more CMMC-like cyber requirements in its governmentwide contracts. Retrieved March 1 2021 from https://www.fedscoop.com/gsa-cmmc-governmentwide-contracts/
[16]
UMD Office of Research Administration. 2021. Historical Data Office of Research Administration. Retrieved March 1 2020 from https://ora.umd.edu/data-reports/historic
[17]
Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, and Paul M. Orgill. 2004. The Urgency for Effective User Privacy-Education to Counter Social Engineering Attacks on Secure Computer Systems. In Proceedings of the 5th Conference on Information Technology Education (Salt Lake City, UT, USA) (CITC5 ’04). Association for Computing Machinery, New York, NY, USA, 177–181. https://doi.org/10.1145/1029533.1029577

Cited By

View all
  • (2022)Cybersecurity and Research are not a DichotomyPractice and Experience in Advanced Research Computing 2022: Revolutionary: Computing, Connections, You10.1145/3491418.3535180(1-4)Online publication date: 8-Jul-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
PEARC '21: Practice and Experience in Advanced Research Computing 2021: Evolution Across All Dimensions
July 2021
310 pages
ISBN:9781450382922
DOI:10.1145/3437359
This work is licensed under a Creative Commons Attribution-NonCommercial International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 July 2021

Check for updates

Author Tags

  1. CUI
  2. DFARS
  3. DUA
  4. FISMA
  5. HIPAA
  6. NIST SP 800-171
  7. NIST SP 800-53
  8. VDI
  9. secure research infrastructure
  10. tiCrypt

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

PEARC '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 133 of 202 submissions, 66%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)248
  • Downloads (Last 6 weeks)76
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Cybersecurity and Research are not a DichotomyPractice and Experience in Advanced Research Computing 2022: Revolutionary: Computing, Connections, You10.1145/3491418.3535180(1-4)Online publication date: 8-Jul-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media