{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:59Z","timestamp":1750220999088,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T00:00:00Z","timestamp":1564272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,28]]},"DOI":"10.1145\/3332186.3340601","type":"proceedings-article","created":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T19:55:41Z","timestamp":1564516541000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Trusted CI Experiences in Cybersecurity and Service to Open Science"],"prefix":"10.1145","author":[{"given":"Andrew","family":"Adams","sequence":"first","affiliation":[{"name":"Pittsburgh Supercomputing Center"}]},{"given":"Kay","family":"Avila","sequence":"additional","affiliation":[{"name":"NCSA"}]},{"given":"Jim","family":"Basney","sequence":"additional","affiliation":[{"name":"NCSA"}]},{"given":"Dana","family":"Brunson","sequence":"additional","affiliation":[{"name":"Internet2"}]},{"given":"Robert","family":"Cowles","sequence":"additional","affiliation":[{"name":"BrightLite Information Security"}]},{"given":"Jeannette","family":"Dopheide","sequence":"additional","affiliation":[{"name":"NCSA"}]},{"given":"Terry","family":"Fleury","sequence":"additional","affiliation":[{"name":"NCSA"}]},{"given":"Elisa","family":"Heymann","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"Florence","family":"Hudson","sequence":"additional","affiliation":[{"name":"Independent Consultant"}]},{"given":"Craig","family":"Jackson","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"Ryan","family":"Kiser","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"Mark","family":"Krenz","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"Jim","family":"Marsteller","sequence":"additional","affiliation":[{"name":"Pittsburgh Supercomputing Center"}]},{"given":"Barton P.","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"Sean","family":"Peisert","sequence":"additional","affiliation":[{"name":"Berkeley Lab"}]},{"given":"Scott","family":"Russell","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"Susan","family":"Sons","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"Von","family":"Welch","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"John","family":"Zage","sequence":"additional","affiliation":[{"name":"NCSA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2013.133"},{"key":"e_1_3_2_1_2_1","unstructured":"Science Gateways Community Institute. {Online}. https:\/\/sciencegateways.org\/  Science Gateways Community Institute. {Online}. https:\/\/sciencegateways.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Molecular Sciences Software Institute. {Online}. http:\/\/molssi.org\/  Molecular Sciences Software Institute. {Online}. http:\/\/molssi.org\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Energy Science Network (ESnet). {Online}. http:\/\/es.net\/  Energy Science Network (ESnet). {Online}. http:\/\/es.net\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Pilot Study for a Cyberinfrastructure Center of Excellence. {Online}. https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1842042  Pilot Study for a Cyberinfrastructure Center of Excellence. {Online}. https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1842042"},{"key":"e_1_3_2_1_6_1","unstructured":"Jeannette Dopheide John Zage and Jim Basney \"The Trusted CI Broader Impacts Project Report\" 2018. {Online}. http:\/\/hdl.handle.net\/2022\/22148  Jeannette Dopheide John Zage and Jim Basney \"The Trusted CI Broader Impacts Project Report\" 2018. {Online}. http:\/\/hdl.handle.net\/2022\/22148"},{"key":"e_1_3_2_1_7_1","volume-title":"First NSF Workshop on Scientific Software Security Innovation Institute,\"","author":"Barnett William","year":"2010","unstructured":"William Barnett , Jim Basney , Randy Butler , and Doug Pearson , \" Report of the First NSF Workshop on Scientific Software Security Innovation Institute,\" October 2010 . {Online}. http:\/\/security.ncsa.illinois.edu\/s3i2\/ William Barnett, Jim Basney, Randy Butler, and Doug Pearson, \"Report of the First NSF Workshop on Scientific Software Security Innovation Institute,\" October 2010. {Online}. http:\/\/security.ncsa.illinois.edu\/s3i2\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Second NSF Workshop on Scientific Software Security Innovation Institute,\"","author":"Barnett William","year":"2011","unstructured":"William Barnett , Jim Basney , Randy Butler , and Doug Pearson , \" Report of the Second NSF Workshop on Scientific Software Security Innovation Institute,\" November 2011 . {Online}. http:\/\/security.ncsa.illinois.edu\/s3i2\/ William Barnett, Jim Basney, Randy Butler, and Doug Pearson, \"Report of the Second NSF Workshop on Scientific Software Security Innovation Institute,\" November 2011. {Online}. http:\/\/security.ncsa.illinois.edu\/s3i2\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Large Facilities Office (LFO). {Online}. https:\/\/www.nsf.gov\/bfa\/lfo\/  Large Facilities Office (LFO). {Online}. https:\/\/www.nsf.gov\/bfa\/lfo\/"},{"key":"e_1_3_2_1_10_1","unstructured":"V. Welch J. Basney C. Jackson J. Marsteller and B. Miller \"The Trusted CI Vision for an NSF Cybersecurity Ecosystem and Five-year Strategic Plan (2019-2023) \" Trusted CI Apr. 2018 {Online}. http:\/\/hdl.handle.net\/2022\/22178  V. Welch J. Basney C. Jackson J. Marsteller and B. Miller \"The Trusted CI Vision for an NSF Cybersecurity Ecosystem and Five-year Strategic Plan (2019-2023) \" Trusted CI Apr. 2018 {Online}. http:\/\/hdl.handle.net\/2022\/22178"},{"key":"e_1_3_2_1_11_1","unstructured":"M. Suby and F.Dickson. \"The 2015 (ISC)2 Global Information Security Workforce Study \" 2015 {Online}. Available: https:\/\/www.isc2.org  M. Suby and F.Dickson. \"The 2015 (ISC)2 Global Information Security Workforce Study \" 2015 {Online}. Available: https:\/\/www.isc2.org"},{"key":"e_1_3_2_1_12_1","unstructured":"IAdvanced Scientific Computing Advisory Committee. \"ASCAC Workforce Subcommittee Letter \" 2014 {Online}. Available: https:\/\/science.energy.gov\/~\/media\/ascr\/ascac\/pdf\/charges\/ASCAC_Workforce_Letter_Report.pdf  IAdvanced Scientific Computing Advisory Committee. \"ASCAC Workforce Subcommittee Letter \" 2014 {Online}. Available: https:\/\/science.energy.gov\/~\/media\/ascr\/ascac\/pdf\/charges\/ASCAC_Workforce_Letter_Report.pdf"},{"key":"e_1_3_2_1_13_1","unstructured":"S. Russell B. Cowles C. Jackson \"Cybersecurity Budgets \" NSF Cybersecurity Summit Arlington VA August 2016.  S. Russell B. Cowles C. Jackson \"Cybersecurity Budgets \" NSF Cybersecurity Summit Arlington VA August 2016."},{"key":"e_1_3_2_1_14_1","unstructured":"NSF Solicitation 15-549. {Online}. https:\/\/www.nsf.gov\/publications\/pub_summ.jsp?ods_key=nsf15549&org=NSF  NSF Solicitation 15-549. {Online}. https:\/\/www.nsf.gov\/publications\/pub_summ.jsp?ods_key=nsf15549&org=NSF"},{"key":"e_1_3_2_1_15_1","unstructured":"Trusted CI Annual Reports. {Online}. https:\/\/trustedci.org\/reports  Trusted CI Annual Reports. {Online}. https:\/\/trustedci.org\/reports"},{"key":"e_1_3_2_1_16_1","volume-title":"Center for Trustworthy Scientific Cyberinfrastructure","author":"Developing Cybersecurity Guide","year":"2014","unstructured":"\" Guide to Developing Cybersecurity Programs for NSF Science and Engineering Projects ,\" v1 , Center for Trustworthy Scientific Cyberinfrastructure . August 2014 {Online}. https:\/\/trustedci.org\/guide \"Guide to Developing Cybersecurity Programs for NSF Science and Engineering Projects,\" v1, Center for Trustworthy Scientific Cyberinfrastructure. August 2014 {Online}. https:\/\/trustedci.org\/guide"},{"key":"e_1_3_2_1_17_1","unstructured":"Center for Internet Security Critical Security Controls.{Online}. https:\/\/www.sans.org\/critical-security-controls\/  Center for Internet Security Critical Security Controls.{Online}. https:\/\/www.sans.org\/critical-security-controls\/"},{"key":"e_1_3_2_1_18_1","volume-title":"Baseline Controls and Best Practices","author":"Projects Securing Commodity IT","year":"2014","unstructured":"\" Securing Commodity IT in Scientific CI Projects : Baseline Controls and Best Practices .\" August 2014 {Online}. https:\/\/trustedci.org\/guide\/docs\/commodityIT \"Securing Commodity IT in Scientific CI Projects: Baseline Controls and Best Practices.\" August 2014 {Online}. https:\/\/trustedci.org\/guide\/docs\/commodityIT"},{"key":"e_1_3_2_1_19_1","unstructured":"Sean Peisert Von Welch Andrew Adams RuthAnne Bevier Michael Dopheide Rich LeDuc Pascal Meunier Steve Schwab and Karen Stocks. 2017. \"Open Science Cyber Risk Profile (OSCRP) \" v1.2. March 2017. {Online}. http:\/\/hdl.handle.net\/2022\/21259  Sean Peisert Von Welch Andrew Adams RuthAnne Bevier Michael Dopheide Rich LeDuc Pascal Meunier Steve Schwab and Karen Stocks. 2017. \"Open Science Cyber Risk Profile (OSCRP) \" v1.2. March 2017. {Online}. http:\/\/hdl.handle.net\/2022\/21259"},{"key":"e_1_3_2_1_20_1","unstructured":"Andrew Adams Jeannette Dopheide Mark Krenz James Marsteller Von Welch and John Zage. \"Report of the 2018 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities.\" 2018 {Online}. http:\/\/hdl.handle.net\/2022\/22588  Andrew Adams Jeannette Dopheide Mark Krenz James Marsteller Von Welch and John Zage. \"Report of the 2018 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities.\" 2018 {Online}. http:\/\/hdl.handle.net\/2022\/22588"},{"key":"e_1_3_2_1_21_1","unstructured":"Craig Jackson Amy Starzynski Coddens. \"Report of the 2015 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities: Large Facility Cybersecurity Challenges and Responses.\" 2015 {Online}. http:\/\/hdl.handle.net\/2022\/20539  Craig Jackson Amy Starzynski Coddens. \"Report of the 2015 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities: Large Facility Cybersecurity Challenges and Responses.\" 2015 {Online}. http:\/\/hdl.handle.net\/2022\/20539"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016741.2016771"},{"key":"e_1_3_2_1_23_1","unstructured":"\"Framework for Improving Critical Infrastructure Cybersecurity \" National Institute of Standards and Technology Feb. 2014 {Online}. Retrieved April 1 2019 from https:\/\/www.nist.gov\/cyberframework  \"Framework for Improving Critical Infrastructure Cybersecurity \" National Institute of Standards and Technology Feb. 2014 {Online}. Retrieved April 1 2019 from https:\/\/www.nist.gov\/cyberframework"},{"key":"e_1_3_2_1_24_1","volume-title":"Protecting CUI in Nonfederal Systems and Organizations | CSRC.\" {Online}. Retrieved","author":"A. R. R.","year":"2019","unstructured":"A. R. R. (nist), A. K. D. (nist), A. P. V. (nara), A. M. R. (nara), and A. G. G. (ida), \" SP 800-171 Rev . 1 , Protecting CUI in Nonfederal Systems and Organizations | CSRC.\" {Online}. Retrieved April 1, 2019 from https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-171\/rev-1\/final A. R. R. (nist), A. K. D. (nist), A. P. V. (nara), A. M. R. (nara), and A. G. G. (ida), \"SP 800-171 Rev. 1, Protecting CUI in Nonfederal Systems and Organizations | CSRC.\" {Online}. Retrieved April 1, 2019 from https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-171\/rev-1\/final"}],"event":{"name":"PEARC '19: Practice and Experience in Advanced Research Computing","acronym":"PEARC '19","location":"Chicago IL USA"},"container-title":["Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3332186.3340601","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3332186.3340601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:39Z","timestamp":1750206339000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3332186.3340601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,28]]},"references-count":24,"alternative-id":["10.1145\/3332186.3340601","10.1145\/3332186"],"URL":"https:\/\/doi.org\/10.1145\/3332186.3340601","relation":{},"subject":[],"published":{"date-parts":[[2019,7,28]]},"assertion":[{"value":"2019-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}