10–14 Oct 2016
San Francisco Marriott Marquis
America/Los_Angeles timezone

Session

Track 8: Security, Policy and Outreach

T8
10 Oct 2016, 11:00
Sierra C (San Francisco Mariott Marquis)

Sierra C

San Francisco Mariott Marquis

Conveners

Track 8: Security, Policy and Outreach: 8.1

  • David Michael South (Deutsches Elektronen-Synchrotron (DE))

Track 8: Security, Policy and Outreach: 8.2

  • Torre Wenaus (Brookhaven National Laboratory (US))

Track 8: Security, Policy and Outreach: 8.3

  • Hannah Short (CERN)

Presentation materials

There are no materials yet.

  1. Steven Goldfarb (University of Melbourne (AU))
    10/10/2016, 11:00
    Track 8: Security, Policy and Outreach
    Oral

    The installation of Virtual Visit services by the LHC collaborations began shortly after the first high energy collisions were provided by the CERN accelerator in 2010. The experiments: ATLAS, CMS, LHCb, and ALICE have all joined in this popular and effective method to bring the excitement of scientific exploration and discovery into classrooms and other public venues around the world. Their...

    Go to contribution page
  2. Fons Rademakers (CERN)
    10/10/2016, 11:15
    Track 8: Security, Policy and Outreach
    Oral

    CERN openlab is a unique public-private partnership between CERN and leading IT companies and research institutes. Having learned a lot from the close collaboration with industry in many different projects we now are using this experience to transfer some of our knowledge to other scientific fields, specifically in the areas of code optimization for the simulations of biological dynamics and...

    Go to contribution page
  3. Andrew Haas (New York University)
    10/10/2016, 11:30
    Track 8: Security, Policy and Outreach
    Oral

    Since the launch of HiggsHunters.org in November 2014, citizen science volunteers
    have classified more than a million points of interest in images from the ATLAS experiment
    at the LHC. Volunteers have been looking for displaced vertices and unusual features in images
    recorded during LHC Run-1. We discuss the design of the project, its impact on the public,
    and the surprising results of how...

    Go to contribution page
  4. Marco Clemencic (CERN)
    10/10/2016, 11:45
    Track 8: Security, Policy and Outreach
    Oral

    The vast majority of high-energy physicists use and produce software every day. Software skills are usually acquired “on the go” and dedicated training courses are rare. The LHCb Starterkit is a new training format for getting LHCb collaborators started in effectively using software to perform their research. The course focuses on teaching basic skills for research computing. Unlike...

    Go to contribution page
  5. Lars Holm Nielsen (CERN)
    10/10/2016, 12:00
    Track 8: Security, Policy and Outreach
    Oral

    We present the new Invenio 3 digital library framework and demonstrate
    its application in the field of open research data repositories. We
    notably look at how the Invenio technology has been applied in two
    research data services: (1) the CERN Open Data portal that provides
    access to the approved open datasets and software of the ALICE, ATLAS,
    CMS and LHCb collaborations; (2) the Zenodo...

    Go to contribution page
  6. Andrey Ustyuzhanin (Yandex School of Data Analysis (RU))
    10/10/2016, 12:15
    Track 8: Security, Policy and Outreach
    Oral

    A framework for performing a simplified particle physics data analysis has been created. The project analyses a pre-selected sample from the full 2011 LHCb data. The analysis aims to measure matter antimatter asymmetries. It broadly follows the steps in a significant LHCb publication where large CP violation effects are observed in charged B meson three-body decays to charged pions and kaons....

    Go to contribution page
  7. Adrian Mönnich (CERN)
    13/10/2016, 11:00
    Track 8: Security, Policy and Outreach
    Oral

    The last two years have been atypical to the Indico community, as the development team undertook an extensive rewrite of the application and deployed no less than 9 major releases of the system. Users at CERN have had the opportunity to experience the results of this ambitious endeavour. They have only seen, however, the "tip of the iceberg".

    Indico 2.0 employs a completely new stack,...

    Go to contribution page
  8. Sebastian Lopienski (CERN)
    13/10/2016, 11:15
    Track 8: Security, Policy and Outreach
    Oral

    The CERN Computer Security Team is assisting teams and individuals at CERN who want to address security concerns related to their computing endeavours. For projects in the early stages, we help incorporate security in system architecture and design. For software that is already implemented, we do penetration testing. For particularly sensitive components, we perform code reviews. Finally, for...

    Go to contribution page
  9. Hannah Short (CERN)
    13/10/2016, 11:30
    Track 8: Security, Policy and Outreach
    Oral

    HEP has long been considered an exemplary field in Federated Computing; the benefit of this technology has been recognised by the thousands of researchers who have used the grid for nearly 15 years. Whilst the infrastructure is mature and highly successful, Federated Identity Management (FIM) is one area in which the HEP community should continue to evolve.

    The ability for a researcher to use...

    Go to contribution page
  10. Dr Paul Millar (Deutsches Elektronen-Synchrotron (DE))
    13/10/2016, 11:45
    Track 8: Security, Policy and Outreach
    Oral

    For over a decade, X509 Proxy Certificates are used in High Energy Physics (HEP) to authenticate users and guarantee their membership in Virtual Organizations, on which subsequent authorization, e.g. for data access, is based upon. Although the established infrastructure worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as...

    Go to contribution page
  11. Hannah Short (CERN)
    13/10/2016, 12:00
    Track 8: Security, Policy and Outreach
    Oral

    Access to WLCG resources is authenticated using an X509 and PKI infrastructure. Even though HEP users have always been exposed to certificates directly, the development of modern Web Applications by the LHC experiments calls for simplified authentication processes keeping the underlying software unmodified.
    In this work we will show an integrated Web-oriented solution (code name Kipper) with...

    Go to contribution page
  12. Romain Wartel (CERN)
    13/10/2016, 12:15
    Track 8: Security, Policy and Outreach
    Oral

    This presentation offers an overview of the current security landscape - the threats, tools, techniques and procedures followed by attackers. These attackers range from cybercriminals aiming to make a profit, to nation-states searching for valuable information. Threat vectors have evolved in recent years; focus has shifted significantly, from targeting computer services directly, to aiming for...

    Go to contribution page
  13. Lukas Alexander Heinrich (New York University (US))
    13/10/2016, 14:00
    Track 8: Security, Policy and Outreach
    Oral

    The Durham High Energy Physics Database (HEPData) has been built up over the past four decades as a unique open-access repository for scattering data from experimental particle physics. It is comprised of data points from plots and tables underlying over eight thousand publications, some of which are from the Large Hadron Collider (LHC) at CERN.

    HEPData has been rewritten from the ground up...

    Go to contribution page
  14. Prof. Douglas Thain (University of Notre Dame)
    13/10/2016, 14:15
    Track 8: Security, Policy and Outreach
    Oral

    Reproducibility is an essential component of the scientific process.
    It is often necessary to check whether multiple runs of the same software
    produce the same result. This may be done to validate whether a new machine
    produces correct results on old software, whether new software produces
    correct results on an old machine, or to compare the equality of two different approaches to the...

    Go to contribution page
  15. Ana Trisovic (University of Cambridge (GB))
    13/10/2016, 14:30
    Track 8: Security, Policy and Outreach
    Oral

    The Large Hadron Collider beauty (LHCb) experiment at CERN specializes in investigating the slight differences between matter and antimatter by studying the decays of beauty or bottom (B) and charm (D) hadrons. The detector has been recording data from proton-proton collisions since 2010. Data preservation (DP) project at the LHCb insures preservation of the experimental and simulated (Monte...

    Go to contribution page
  16. Torre Wenaus (Brookhaven National Laboratory (US))
    13/10/2016, 14:45
    Track 8: Security, Policy and Outreach
    Oral

    HEP software today is a rich and diverse domain in itself and exists within the mushrooming world of open source software. As HEP software developers and users we can be more productive and effective if our work and our choices are informed by a good knowledge of what others in our community have created or found useful. The HEP Software and Computing Knowledge Base, [hepsoftware.org][1], was...

    Go to contribution page
  17. Lukas Alexander Heinrich (New York University (US))
    13/10/2016, 15:00
    Track 8: Security, Policy and Outreach
    Oral

    LHC data analyses consist of workflows that utilize a diverse set of software tools to produce physics results. The different set of tools range from large software frameworks like Gaudi/Athena to single-purpose scripts written by the analysis teams. The analysis steps that lead to a particular physics result are often not reproducible without significant assistance from the original authors....

    Go to contribution page
Building timetable...