{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:57:12Z","timestamp":1770818232267,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,22]],"date-time":"2018-07-22T00:00:00Z","timestamp":1532217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,22]]},"DOI":"10.1145\/3219104.3229246","type":"proceedings-article","created":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T17:46:44Z","timestamp":1531417604000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["High Performance Computing Evaluate And Plan"],"prefix":"10.1145","author":[{"given":"Beth Lynn","family":"Eicher","sequence":"first","affiliation":[{"name":"Arcutek Corporation, Chicago, IL, USA"}]},{"given":"Steven","family":"Solomon","sequence":"additional","affiliation":[{"name":"Arcutek Corporation, Chicago, IL, USA"}]},{"given":"Shawn","family":"Hall","sequence":"additional","affiliation":[{"name":"Numerical Algorithms Group, Lisle, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,7,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"National Institute of Standards and Technology Special Publication 800-53A Revision 4 Assessing Security and Privacy Controls in Federal Information Systems and Organization. 2014-12. Accessed: 2018-06-01.   National Institute of Standards and Technology Special Publication 800-53A Revision 4 Assessing Security and Privacy Controls in Federal Information Systems and Organization. 2014-12. Accessed: 2018-06-01."},{"key":"e_1_3_2_1_2_1","volume-title":"Computing Security Workshop: 2018","year":"2018"},{"key":"e_1_3_2_1_3_1","first-page":"03","volume":"201","author":"PILLITTERI V.","journal-title":"NIST Risk Management Framework Overview."},{"key":"e_1_3_2_1_4_1","unstructured":"Security Controls and Assessment Procedures for Federal Information Systems and Organizations Control Families. 2014-12. https:\/\/nvd.nist.gov\/800-53\/Rev4 Accessed: 2018- 06- 01.  Security Controls and Assessment Procedures for Federal Information Systems and Organizations Control Families. 2014-12. https:\/\/nvd.nist.gov\/800-53\/Rev4 Accessed: 2018- 06- 01."},{"key":"e_1_3_2_1_5_1","unstructured":"Access Control Family. 2014-12. https:\/\/nvd.nist.gov\/800-53\/Rev4\/family\/Access%20Control Accessed: 2018- 06- 01.  Access Control Family. 2014-12. https:\/\/nvd.nist.gov\/800-53\/Rev4\/family\/Access%20Control Accessed: 2018- 06- 01."},{"key":"e_1_3_2_1_6_1","unstructured":"A Free Flexible and Secure Way To Provide Multiple Factors of Authentication to Your Community. https:\/\/www.tacc.utexas.edu\/-\/a-free-flexible-and-secure-way-to-provide-multiple-factors-of-authentication-to-your-community Accessed: 2018- 06- 01.  A Free Flexible and Secure Way To Provide Multiple Factors of Authentication to Your Community. https:\/\/www.tacc.utexas.edu\/-\/a-free-flexible-and-secure-way-to-provide-multiple-factors-of-authentication-to-your-community Accessed: 2018- 06- 01."},{"key":"e_1_3_2_1_7_1","unstructured":"Galaxy. The Galaxy Project. 2018 https:\/\/www.usegalaxy.org\/  Galaxy. The Galaxy Project. 2018 https:\/\/www.usegalaxy.org\/"},{"key":"e_1_3_2_1_8_1","unstructured":"OSC OnDemand. Ohio Supercomputer Center. 2018. https:\/\/www.osc.edu\/supercomputing\/portals  OSC OnDemand. Ohio Supercomputer Center. 2018. https:\/\/www.osc.edu\/supercomputing\/portals"},{"key":"e_1_3_2_1_9_1","unstructured":"National Institute of Standards and Technology Special Publication 800-30 Revision 1 Guide for Conducting Risk Assessments. 2014-09. Accessed: 2018-06-01.  National Institute of Standards and Technology Special Publication 800-30 Revision 1 Guide for Conducting Risk Assessments. 2014-09. Accessed: 2018-06-01."},{"key":"e_1_3_2_1_10_1","unstructured":"Security Content Automation Protocol. https:\/\/csrc.nist.gov\/Projects\/Security-Content-Automation-Protocol\/SCAP-Content Accessed: 2018-06-01.  Security Content Automation Protocol. https:\/\/csrc.nist.gov\/Projects\/Security-Content-Automation-Protocol\/SCAP-Content Accessed: 2018-06-01."},{"key":"e_1_3_2_1_11_1","unstructured":"National Vulnerabilities Database The National Checklist Program Repository. https:\/\/nvd.nist.gov\/ncp\/repository?scap_Accessed: 2018-06-01.  National Vulnerabilities Database The National Checklist Program Repository. https:\/\/nvd.nist.gov\/ncp\/repository?scap_Accessed: 2018-06-01."},{"key":"e_1_3_2_1_12_1","unstructured":"Open-Scap. Red Hat Incorporated. 2018. https:\/\/www.open-scap.org\/download\/  Open-Scap. Red Hat Incorporated. 2018. https:\/\/www.open-scap.org\/download\/"},{"key":"e_1_3_2_1_13_1","unstructured":"NSF America's Seed Fund SBIR STTR. https:\/\/seedfund.nsf.gov\/ Accessed: 2018-06-01.  NSF America's Seed Fund SBIR STTR. https:\/\/seedfund.nsf.gov\/ Accessed: 2018-06-01."}],"event":{"name":"PEARC '18: Practice and Experience in Advanced Research Computing","location":"Pittsburgh PA USA","acronym":"PEARC '18"},"container-title":["Proceedings of the Practice and Experience on Advanced Research Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219104.3229246","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219104.3229246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:12Z","timestamp":1750212432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219104.3229246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,22]]},"references-count":13,"alternative-id":["10.1145\/3219104.3229246","10.1145\/3219104"],"URL":"https:\/\/doi.org\/10.1145\/3219104.3229246","relation":{},"subject":[],"published":{"date-parts":[[2018,7,22]]},"assertion":[{"value":"2018-07-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}