Trust Part 1 and 2
Trust Part 1: The VRE4EIC AAI - Authentication & Authorization Infrastructure is explained by Jacco van Ossenbruggen from CWI in part 1 of this tutorial on trust.
Every Web application that provides access to expensive services or sensitive data needs to ensure this access is only given to trusted persons at the right time for the right reasons. Modern Authentication & Authorization Infrastructures provide scalable, federated solutions for this requirement. This video discusses the basic technical and organizational concepts of federated authentication and authorization protocols.
Trust Part 2: Trustable Computing in Open Science
When and why should you trust research datasets, the computations used to analyze them, and the conclusions drawn from the analyis results? In this video, we discuss the extent to which research data and research software can be subjected to a fit for use assessment, and how to improve upon the traditional approach where only the academic paper is published after peer review, while research data and research software used to produce the results in the paper remains unavailable for critical analysis and reuse by others.