The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities.
Principal Investigators and Senior Personnel:
Keith R. Jackson
Mary R. Thompson
Publications resulting from this project:
Karlo Berket and Deborah Agarwal. Enabling Secure Ad-Hoc Collaboration. In Proceedings of the Workshop on Advanced Collaborative Environments (WACE), Seattle, WA, 2003.
Deborah Agarwal, Markus Lorch, Mary Thompson, and Marcia Perry. A New Security Model for Collaborative Environments. In Proceedings of the Workshop on Advanced Collaborative Environments (WACE), Seattle, WA, June 2003.
D. Agarwal and K. Berket. Supporting dynamic ad hoc collaboration capabilities. Arxiv preprint cs/0307037, 2003.
Deborah Agarwal, Charles McParland, and Marcia Perry. Supporting collaborative computing and interaction. Technical report LBNL-50418, Lawrence Berkeley National Laboratory, 2002.
Deborah Agarwal, Keith Jackson, and Mary Thompson. Securing collaborative environments. Technical report LBNL-50427, Lawrence Berkeley National Laboratory, 2002.
More information is available on other Berkeley Lab R&D projects focusing on cybersecurity in general, as well as specifically on cybersecurity for scientific and high-performance computing.