Last updated: 
1 month 2 weeks ago
Group Manager

At the request of the Research Councils UK e-Infrastructure group, Janet established a working group from 2013-2016 to support those providing and using e-infrastructure services in achieving an approach that both protects services from threats and is usable by practitioners. More detail about the group can be found in the Terms of Reference

The Working Group published the following papers:

Information about the Working Group's activities, as well as discussion documents, links and recommendations is linked under the following categories. Unless marked otherwise, all items are works-in-progress and we very much welcome your comments and contributions.

Meetings   Presentations
Case Studies Discussions Technologies

Andrew Cormack (WG Chair)


At the recent Working Group meeting I presented this diagram, which I've been using to get my head around the various components of an e-infrastructure and how they fit together. It's very much a work in progress: the typefaces show areas I'm reasonably confident of (in Roman) versus those (in Italic) where the implementation, and in some cases even the best combination of functions, are less clear to me. I'm still refining the diagram so comments and suggestions are welcome.


Some thoughts on the e-Infrastructure requirements for supporting Virtual

 A Virtual Organisation (VO) is one that intersects with multiple real
organisation.  It is comprised of users from multiple home
institutions. Many of which may be entirely unaware of the existence
of the VO at all.  This means that the Virtual Organisation needs to
be self-organising and must be provided with the tools to manage its
own membership.


During January and February 2014, we’ve met with a number of different e-infrastructures. Based on those meetings I’ve summarised what appears to be a common user journey in the headings below; at each stage I’ve noted where it seems to me that there may be common features that the Working Group might consider for further study. These ideas were presented at the e-Infrastructure Project Directors' Group and at our March 2014 Working Group meeting: slides are attached.

Blog Article

I've had several conversations this week that related to what's commonly referred to as "level of assurance": how confident we can be that an account or other information about an on-line user actually relates to the person currently sitting at the keyboard. Governments may be concerned with multiple forms of documentary proof but I suspect that for most common uses in the education sector that may be over-complicating things.


In discussions with e-Infrastructures we’ve spoken quite a bit about federated authentication, so I thought it was worth a quick summary of the federated authentication schemes already available on Janet. And, in particular, what the policies of those federations already offer to Service Providers by way of guarantees.

Prev | Next