

Issues of privacy and security are of concern in any network activity. Homogeneous networks, such as MFE net and SACNET, were not considered since they could not be used for general purpose resource sharing. The investigation focused on heterogeneous networks in which a variety of dissimilar computers and operating systems were interconnected nationwide. Volume 3 analyzes the benefits and barriers encountered in actual resource sharing experience, and provides case histories of typical = , More than twenty persons, representing seven ERDA computing sites, made extensive use of both ERDA and non-ERDA computers in coordinating, compiling, and formatting the data which constitute the bulk of this report. The investigation itself furnishes an excellent example of computational resource sharing through a heterogeneous network. Further development of ERDA networking will need to incorporate additional mechanisms to prevent infringement of privacy. Therefore, the existing mechanisms at individual sites for protecting sensitive data were relied on, and no new protection mechanisms to prevent infringement of privacy and security were attempted.

However, consideration of privacy and security of sensitive data arise to a much lesser degree in unclassified scientific research than in areas involving personal or proprietary information.
