Peer-reviewed Publications

Permanent link for this collection

Browse

Recent Submissions

Now showing 1 - 3 of 3
  • Item
    Your Good Health is a Workforce Issue
    (2018-07) Craig, stewart; Marion, Krefeldt
    The high performance computing (HPC), cyberinfrastructure, and research and academic information technology communities are small - too small to fulfill current needs for such professionals in the US. Members of this community are also often under a lot of stress, and with that can come health problems. The senior author was diagnosed with Stage IV cancer in early 2017. In this paper, we share what we have learned about health management in general and dealing with cancer in particular, focusing on lessons that are portable to other members of the HPC, cyberinfrastructure, and research and academic information technology communities. We also make recommendations to the National Science Foundation regarding changes the NSF could make to reduce some of the stress this community feels on a day-in, day-out basis. The key point of this report is to provide information to members of the cyberinfrastructure community that they might not already have - and might not receive from their primary care physicians - that will help them live longer and healthier lives. While our own experiences are based on one of the author’s diagnosis of cancer, the information presented here should be of general value to all in terms of strategies for reducing and detecting long-term health risks. Our hope is that this information will help you be as healthy as possible until you reach retirement age and then healthy during a well-deserved and long period of retirement!
  • Item
    Using Keycloak for Gateway Authentication and Authorization
    (2017-10-09) Christie, Marcus A.; Bhandar, Anuj; Nakandala, Supun; Marru, Suresh; Abeysinghe, Eroma; Pamidighantam, Sudhakar; Pierce, Marlon E.
    Establishing users’ identities before they access research infrastructure resources is a key feature of science gateways. With many science gateways now relying on general purpose gateway platform services, the challenges of managing identity-derived features have expanded to include authorization between science gateway tenants, middleware, and third party identity provider services. The latter include campus identity management systems. This paper examines the use of Keycloak as an implementation of an identity management system for Apache Airavata middleware, replacing our previous WSO2 Identity Server-based implementation. This effort raises larger issues that software-as-a-service communities should consider when embedding dependencies on third party software and services, including developing selection criteria and future-proofing systems.
  • Item
    OASIS: a data and software distribution service for Open Science Grid
    (J. Phys.: Conf. Ser. 513, 2014-06-11) Quick, Robert E.; Teige, Scott; Bockleman, Brian; Hover, John; Caballero, Jose
    The Open Science Grid encourages the concept of software portability: a user's scientific application should be able to run at as many sites as possible. It is necessary to provide a mechanism for OSG Virtual Organizations to install software at sites. Since its initial release, the OSG Compute Element has provided an application software installation directory to Virtual Organizations, where they can create their own sub-directory, install software into that sub-directory, and have the directory shared on the worker nodes at that site. The current model has shortcomings with regard to permissions, policies, versioning, and the lack of a unified, collective procedure or toolset for deploying software across all sites. Therefore, a new mechanism for data and software distribution is desirable. The architecture for the OSG Application Software Installation Service (OASIS) is a server-client model: the software and data are installed only once in a single place, and are automatically distributed to all client sites simultaneously. Central file distribution offers other advantages, including server-side authentication and authorization, activity records, quota management, data validation and inspection, and well-defined versioning and deletion policies. The architecture, as well as a complete analysis of the current implementation, are described in this paper.