{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:45Z","timestamp":1750220685451,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,17]],"date-time":"2021-07-17T00:00:00Z","timestamp":1626480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,17]]},"DOI":"10.1145\/3437359.3465577","type":"proceedings-article","created":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T04:08:46Z","timestamp":1626581326000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Research Infrastructure Using tiCrypt"],"prefix":"10.1145","author":[{"given":"Erik","family":"Deumens","sequence":"first","affiliation":[{"name":"University of Florida, USA"}]},{"given":"Thomas","family":"Samant","sequence":"additional","affiliation":[{"name":"University of Florida, USA"}]},{"given":"Eric","family":"Byrd","sequence":"additional","affiliation":[{"name":"University of Maryland, USA"}]},{"given":"Samuel","family":"Porter","sequence":"additional","affiliation":[{"name":"University of Maryland, USA"}]},{"given":"Axel","family":"Haenssen","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Curtis W. W.","family":"Hillegas","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Elizabeth","family":"Holtz","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Irene","family":"Kopaliani","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,7,17]]},"reference":[{"volume-title":"Health Insurance Portability and Accountability Act of","year":"1996","key":"e_1_3_2_1_1_1","unstructured":"2018. Health Insurance Portability and Accountability Act of 1996 . https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html 2018. Health Insurance Portability and Accountability Act of 1996. https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html"},{"volume-title":"Compliance with CUI and GLBA. Retrieved","year":"2021","key":"e_1_3_2_1_2_1","unstructured":"2020. Federal Student Aid: Protecting Student Information ? Compliance with CUI and GLBA. Retrieved March 08, 2021 from https:\/\/ifap.ed.gov\/electronic-announcements\/121820CybersecurityProtectStudentInfoComplianceCUInGLBA 2020. Federal Student Aid: Protecting Student Information ? Compliance with CUI and GLBA. Retrieved March 08, 2021 from https:\/\/ifap.ed.gov\/electronic-announcements\/121820CybersecurityProtectStudentInfoComplianceCUInGLBA"},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Coleridge Initiative NYU. https:\/\/coleridgeinitiative.org\/  2021. Coleridge Initiative NYU. https:\/\/coleridgeinitiative.org\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Federal Information Security Modernization Act. https:\/\/www.cisa.gov\/federal-information-security-modernization-act  2021. Federal Information Security Modernization Act. https:\/\/www.cisa.gov\/federal-information-security-modernization-act"},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Fragile Families. https:\/\/fragilefamilies.princeton.edu\/  2021. Fragile Families. https:\/\/fragilefamilies.princeton.edu\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2021. NJ Families Study. https:\/\/njfamilies.princeton.edu\/index.html  2021. NJ Families Study. https:\/\/njfamilies.princeton.edu\/index.html"},{"key":"e_1_3_2_1_7_1","unstructured":"2021. Princeton Institute for Computational Science and Engineering. https:\/\/researchcomputing.princeton.edu\/about\/about-picscie  2021. Princeton Institute for Computational Science and Engineering. https:\/\/researchcomputing.princeton.edu\/about\/about-picscie"},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Princeton University Research Computing. https:\/\/researchcomputing.princeton.edu  2021. Princeton University Research Computing. https:\/\/researchcomputing.princeton.edu"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. RHEDCloud. https:\/\/www.rhedcloud.org\/  2021. RHEDCloud. https:\/\/www.rhedcloud.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2021. RightScale. https:\/\/www.flexera.com  2021. RightScale. https:\/\/www.flexera.com"},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Springdale Linux. http:\/\/springdale.math.ias.edu\/  2021. Springdale Linux. http:\/\/springdale.math.ias.edu\/"},{"key":"e_1_3_2_1_12_1","unstructured":"2021. Tera Insights. https:\/\/terainsights.com\/  2021. Tera Insights. https:\/\/terainsights.com\/"},{"key":"e_1_3_2_1_13_1","unstructured":"2021. Tera Insights. https:\/\/ticrypt.com\/  2021. Tera Insights. https:\/\/ticrypt.com\/"},{"key":"e_1_3_2_1_14_1","unstructured":"2021. University of Florida Research Computing. https:\/\/www.rc.ufl.edu\/  2021. University of Florida Research Computing. https:\/\/www.rc.ufl.edu\/"},{"key":"e_1_3_2_1_15_1","volume-title":"GSA considering more CMMC-like cyber requirements in its governmentwide contracts. Retrieved","author":"Billy Mitchell 0.","year":"2021","unstructured":"Billy Mitchell . 202 0. GSA considering more CMMC-like cyber requirements in its governmentwide contracts. Retrieved March 1 2021 from https:\/\/www.fedscoop.com\/gsa-cmmc-governmentwide-contracts\/ Billy Mitchell. 2020. GSA considering more CMMC-like cyber requirements in its governmentwide contracts. Retrieved March 1 2021 from https:\/\/www.fedscoop.com\/gsa-cmmc-governmentwide-contracts\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Historical Data Office of Research Administration. Retrieved","author":"UMD\u00a0Office of Research\u00a0Administration","year":"2020","unstructured":"UMD\u00a0Office of Research\u00a0Administration . 2021. Historical Data Office of Research Administration. Retrieved March 1 2020 from https:\/\/ora.umd.edu\/data-reports\/historic UMD\u00a0Office of Research\u00a0Administration. 2021. Historical Data Office of Research Administration. Retrieved March 1 2020 from https:\/\/ora.umd.edu\/data-reports\/historic"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 5th Conference on Information Technology Education","author":"Gregory\u00a0 L.","year":"2004","unstructured":"Gregory\u00a0 L. Orgill , Gordon\u00a0 W. Romney , Michael\u00a0 G. Bailey , and Paul\u00a0 M. Orgill . 2004 . The Urgency for Effective User Privacy-Education to Counter Social Engineering Attacks on Secure Computer Systems . In Proceedings of the 5th Conference on Information Technology Education ( Salt Lake City, UT, USA) (CITC5 \u201904). Association for Computing Machinery, New York, NY, USA, 177\u2013181. https:\/\/doi.org\/10.1145\/1029533.1029577 10.1145\/1029533.1029577 Gregory\u00a0L. Orgill, Gordon\u00a0W. Romney, Michael\u00a0G. Bailey, and Paul\u00a0M. Orgill. 2004. The Urgency for Effective User Privacy-Education to Counter Social Engineering Attacks on Secure Computer Systems. In Proceedings of the 5th Conference on Information Technology Education (Salt Lake City, UT, USA) (CITC5 \u201904). Association for Computing Machinery, New York, NY, USA, 177\u2013181. https:\/\/doi.org\/10.1145\/1029533.1029577"}],"event":{"name":"PEARC '21: Practice and Experience in Advanced Research Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"],"location":"Boston MA USA","acronym":"PEARC '21"},"container-title":["Practice and Experience in Advanced Research Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437359.3465577","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437359.3465577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:31Z","timestamp":1750197811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437359.3465577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,17]]},"references-count":17,"alternative-id":["10.1145\/3437359.3465577","10.1145\/3437359"],"URL":"https:\/\/doi.org\/10.1145\/3437359.3465577","relation":{},"subject":[],"published":{"date-parts":[[2021,7,17]]},"assertion":[{"value":"2021-07-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}