-
Notifications
You must be signed in to change notification settings - Fork 15
/
CITATION.cff
149 lines (149 loc) · 4.62 KB
/
CITATION.cff
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
cff-version: 1.2.0
message: "To acknowledge the data safe haven please use the citation and references below."
title: "Turing Data Safe Haven"
url: "https://data-safe-haven.readthedocs.io"
repository-code: "https://github.com/alan-turing-institute/data-safe-haven"
authors:
- given-names: James
family-names: Robinson
- given-names: Martin T.
family-names: O'Reilly
- given-names: Jim
family-names: Madge
- given-names: Tom
family-names: Doel
- given-names: James
family-names: Cunningham
- given-names: Miguel
family-names: Morin
- given-names: Catherine
family-names: Lawrence
- given-names: Rob
family-names: Clarke
- given-names: Ben
family-names: Walden
- given-names: Warick
family-names: Wood
- given-names: Oliver
family-names: Forrest
- given-names: James
family-names: Hetherington
- given-names: Kirstie
family-names: Whitaker
- given-names: Tim
family-names: Hobson
- given-names: George
family-names: Holmes
- given-names: Federico
family-names: Nanni
- given-names: Ed
family-names: Chalstrey
- given-names: Tomas
family-names: Lazauskas
- given-names: Rachel
family-names: Winstanley
- given-names: Daniel
family-names: Allen
- given-names: Alvaro
family-names: Cabrejas Egea
- given-names: Ian
family-names: Carter
- given-names: Hari
family-names: Sood
- given-names: Brett
family-names: Todd
- given-names: Diego
family-names: Arenas
- given-names: Kevin
family-names: Xu
- given-names: Sebastian
family-names: Vollmer
- given-names: Jules
family-names: Manser
- given-names: Christopher
family-names: Edsall
- given-names: Jack
family-names: Roberts
- given-names: Guillaume
family-names: Noell
- given-names: David
family-names: Beavan
license: BSD-3-Clause
keywords:
- "trusted research environment"
- "infrastructure as code"
- "cloud computing"
references:
- title: "Design choices for productive, secure, data-intensive research at scale in the cloud"
doi: 10.48550/arXiv.1908.08737
type: article
authors:
- given-names: Diego
family-names: Arenas
- given-names: Jon
family-names: Atkins
- given-names: Claire
family-names: Austin
- given-names: David
family-names: Beavan
- given-names: Alvaro Cabrejas
family-names: Egea
- given-names: Steven
family-names: Carlysle-Davies
- given-names: Ian
family-names: Carter
- given-names: Rob
family-names: Clarke
- given-names: James
family-names: Cunningham
- given-names: Tom
family-names: Doel
- given-names: Oliver
family-names: Forrest
- given-names: Evelina
family-names: Gabasova
- given-names: James
family-names: Geddes
- given-names: James
family-names: Hetherington
- given-names: Radka
family-names: Jersakova
- given-names: Franz
family-names: Kiraly
- given-names: Catherine
family-names: Lawrence
- given-names: Jules
family-names: Manser
- given-names: Martin T.
family-names: O'Reilly
- given-names: James
family-names: Robinson
- given-names: Helen
family-names: Sherwood-Taylor
- given-names: Serena
family-names: Tierney
- given-names: Catalina A.
family-names: Vallejos
- given-names: Sebastian
family-names: Vollmer
- given-names: Kirstie
family-names: Whitaker
abstract: >
We present a policy and process framework for secure environments for
productive data science research projects at scale, by combining
prevailing data security threat and risk profiles into five sensitivity
tiers, and, at each tier, specifying recommended policies for data
classification, data ingress, software ingress, data egress, user access,
user device control, and analysis environments. By presenting design
patterns for security choices for each tier, and using software defined
infrastructure so that a different, independent, secure research
environment can be instantiated for each project appropriate to its
classification, we hope to maximise researcher productivity and minimise
risk, allowing research organisations to operate with confidence.
date-published: "2019-08-23"
url: "https://arxiv.org/abs/1908.08737"
- title: "Data safe havens in the cloud"
type: website
url: "https://www.turing.ac.uk/research/research-projects/data-safe-havens-cloud"
authors:
- name: "The Alan Turing Institute"