{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:23:18Z","timestamp":1759134198006,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T00:00:00Z","timestamp":1564272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,28]]},"DOI":"10.1145\/3332186.3332250","type":"proceedings-article","created":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T19:55:41Z","timestamp":1564516541000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Making it More Secure"],"prefix":"10.1145","author":[{"given":"Jason","family":"Christopher","sequence":"first","affiliation":[{"name":"Research IT, UC Berkeley, Berkeley, CA, USA"}]},{"given":"Gary","family":"Jung","sequence":"additional","affiliation":[{"name":"Scientific Computing Group, Lawrence Berkeley National Lab, Berkeley, CA, USA"}]},{"given":"Christopher","family":"Doane","sequence":"additional","affiliation":[{"name":"Information Security and Policy, UC Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing Policy. March 9 2015. https:\/\/osp.nih.gov\/wp-content\/uploads\/NIH_Best Practices for Controlled-Access to the Data Subject to the NIH GDS Policy.pdf.  NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing Policy. March 9 2015. https:\/\/osp.nih.gov\/wp-content\/uploads\/NIH_Best Practices for Controlled-Access to the Data Subject to the NIH GDS Policy.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"UC Berkeley \/ Information Security and Policy -- A-Z Policy Catalog: Laws and Regulations. See: https:\/\/security.berkeley.edu\/policy\/laws-regulations.  UC Berkeley \/ Information Security and Policy -- A-Z Policy Catalog: Laws and Regulations. See: https:\/\/security.berkeley.edu\/policy\/laws-regulations."},{"key":"e_1_3_2_1_3_1","unstructured":"UC Berkeley \/ Information Security and Policy -- Minimum Security Standard for Electronic Information. July 2013. See: https:\/\/security.berkeley.edu\/minimum-security-standard-electronic-information-effective-july-2013  UC Berkeley \/ Information Security and Policy -- Minimum Security Standard for Electronic Information. July 2013. See: https:\/\/security.berkeley.edu\/minimum-security-standard-electronic-information-effective-july-2013"},{"key":"e_1_3_2_1_4_1","unstructured":"Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. June 6 2018. See: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-171\/rev-1\/final  Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. June 6 2018. See: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-171\/rev-1\/final"},{"key":"e_1_3_2_1_5_1","unstructured":"NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. See: https:\/\/osp.od.nih.gov\/wp-content\/uploads\/NIH Best Practices for Controlled-Access Data Subject to the NIH GDS Policy.pdf  NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. See: https:\/\/osp.od.nih.gov\/wp-content\/uploads\/NIH Best Practices for Controlled-Access Data Subject to the NIH GDS Policy.pdf"}],"event":{"name":"PEARC '19: Practice and Experience in Advanced Research Computing","acronym":"PEARC '19","location":"Chicago IL USA"},"container-title":["Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3332186.3332250","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3332186.3332250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:38Z","timestamp":1750206338000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3332186.3332250"}},"subtitle":["The Technical and Social Challenges of Expanding the Functionality of an Existing HPC Cluster to Meet University and Federal Data Security Requirements"],"short-title":[],"issued":{"date-parts":[[2019,7,28]]},"references-count":5,"alternative-id":["10.1145\/3332186.3332250","10.1145\/3332186"],"URL":"https:\/\/doi.org\/10.1145\/3332186.3332250","relation":{},"subject":[],"published":{"date-parts":[[2019,7,28]]},"assertion":[{"value":"2019-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}