{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:42:54Z","timestamp":1776109374620,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T00:00:00Z","timestamp":1657238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,8]]},"DOI":"10.1145\/3491418.3535180","type":"proceedings-article","created":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T16:36:23Z","timestamp":1657298183000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity and Research are not a Dichotomy"],"prefix":"10.1145","author":[{"given":"Deb","family":"McCaffrey","sequence":"first","affiliation":[{"name":"Michigan Medicine, USA"}]},{"given":"Jessica","family":"Kelley","sequence":"additional","affiliation":[{"name":"Michigan Medicine, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332186.3340601"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332186.3332250"},{"key":"e_1_3_2_1_3_1","volume-title":"Practice and Experience in Advanced Research Computing","author":"Deumens Erik","unstructured":"Erik Deumens , Thomas Samant , Eric Byrd , Samuel Porter , Axel Haenssen , Curtis W. W. Hillegas , Elizabeth Holtz , and Irene Kopaliani . 2021. Secure Research Infrastructure Using tiCrypt . In Practice and Experience in Advanced Research Computing , ACM , Boston MA USA , 1\u20138. DOI:https:\/\/doi.org\/10.1145\/3437359.3465577 10.1145\/3437359.3465577 Erik Deumens, Thomas Samant, Eric Byrd, Samuel Porter, Axel Haenssen, Curtis W. W. Hillegas, Elizabeth Holtz, and Irene Kopaliani. 2021. Secure Research Infrastructure Using tiCrypt. In Practice and Experience in Advanced Research Computing, ACM, Boston MA USA, 1\u20138. DOI:https:\/\/doi.org\/10.1145\/3437359.3465577"},{"key":"e_1_3_2_1_4_1","unstructured":"Kuan-Ching Li Nitin Sukhija Elizabeth Bautista and Jean-Luc Gaudiot (Eds.). 2022. Cybersecurity and high-performance computing environments: integrated innovations practices and applications (First edition ed.). CRC Press Boca Raton FL.  Kuan-Ching Li Nitin Sukhija Elizabeth Bautista and Jean-Luc Gaudiot (Eds.). 2022. Cybersecurity and high-performance computing environments: integrated innovations practices and applications (First edition ed.). CRC Press Boca Raton FL."},{"key":"e_1_3_2_1_5_1","volume-title":"Practice and Experience in Advanced Research Computing","author":"McCaffrey Deb","unstructured":"Deb McCaffrey , John Brussolo , Ryan Echlin , John Herlocher , Einor Jacobsen , Lovida Roach , Amy Yamasaki , Dan St. Pierre , and Erin Dietrich . 2021. Research Liaisons: the next layer of Facilitation: Research Liaisons . In Practice and Experience in Advanced Research Computing , ACM , Boston MA USA , 1\u20136. DOI:https:\/\/doi.org\/10.1145\/3437359.3465568 10.1145\/3437359.3465568 Deb McCaffrey, John Brussolo, Ryan Echlin, John Herlocher, Einor Jacobsen, Lovida Roach, Amy Yamasaki, Dan St. Pierre, and Erin Dietrich. 2021. Research Liaisons: the next layer of Facilitation: Research Liaisons. In Practice and Experience in Advanced Research Computing, ACM, Boston MA USA, 1\u20136. DOI:https:\/\/doi.org\/10.1145\/3437359.3465568"},{"key":"e_1_3_2_1_6_1","volume-title":"Tolerate, Transfer, or Treat","author":"Odell Laura A.","unstructured":"Laura A. Odell . 2016. Data to Decisions\u2014Terminate , Tolerate, Transfer, or Treat . Institute for Defense Analyses , Alexandria, VA . Retrieved from https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1106083.pdf Laura A. Odell. 2016. Data to Decisions\u2014Terminate, Tolerate, Transfer, or Treat. Institute for Defense Analyses, Alexandria, VA. Retrieved from https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1106083.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx104"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332186.3332247"},{"key":"e_1_3_2_1_9_1","volume-title":"Custos: Security Middleware for Science Gateways. In Practice and Experience in Advanced Research Computing, ACM, Portland OR USA, 278\u2013284. DOI:https:\/\/doi.org\/10.1145\/3311790.3396635","author":"Ranawaka Isuru","year":"2020","unstructured":"Isuru Ranawaka , Suresh Marru , Juleen Graham , Aarushi Bisht , Jim Basney , Terry Fleury , Jeff Gaynor , Dimuthu Wannipurage , Marcus Christie , Alexandru Mahmoud , Enis Afgan , and Marlon Pierce . 2020 . Custos: Security Middleware for Science Gateways. In Practice and Experience in Advanced Research Computing, ACM, Portland OR USA, 278\u2013284. DOI:https:\/\/doi.org\/10.1145\/3311790.3396635 10.1145\/3311790.3396635 Isuru Ranawaka, Suresh Marru, Juleen Graham, Aarushi Bisht, Jim Basney, Terry Fleury, Jeff Gaynor, Dimuthu Wannipurage, Marcus Christie, Alexandru Mahmoud, Enis Afgan, and Marlon Pierce. 2020. Custos: Security Middleware for Science Gateways. In Practice and Experience in Advanced Research Computing, ACM, Portland OR USA, 278\u2013284. DOI:https:\/\/doi.org\/10.1145\/3311790.3396635"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332186.3333058"}],"event":{"name":"PEARC '22: Practice and Experience in Advanced Research Computing","location":"Boston MA USA","acronym":"PEARC '22","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"]},"container-title":["Practice and Experience in Advanced Research Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491418.3535180","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491418.3535180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:06Z","timestamp":1750188666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491418.3535180"}},"subtitle":["How to form a productive operational relationship between research computing and data support teams and information security teams"],"short-title":[],"issued":{"date-parts":[[2022,7,8]]},"references-count":10,"alternative-id":["10.1145\/3491418.3535180","10.1145\/3491418"],"URL":"https:\/\/doi.org\/10.1145\/3491418.3535180","relation":{},"subject":[],"published":{"date-parts":[[2022,7,8]]},"assertion":[{"value":"2022-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}