Skip to content

Commit d9c08a2

Browse files
author
Sven Twardziok
committed
modify index files
1 parent c7fba97 commit d9c08a2

2 files changed

Lines changed: 14 additions & 7 deletions

File tree

docs/general/index.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,10 @@ This section provides the cross-cutting context for the ELIXIR-on-Cloud ecosyste
55
## In this section
66

77
- [GA4GH Cloud Workstream](ga4gh_cloud.md)
8-
Introduces the GA4GH cloud APIs that enable interoperable, federated analysis across providers. It gives background and examples for core standards used throughout this documentation (WES, TES, DRS, TRS) and how they fit into real workflows.
8+
Introduces the GA4GH cloud APIs that enable interoperable, federated analysis across providers. It gives background and examples for core standards used throughout this documentation (WES, TES, DRS, TRS) and how they fit into real workflows.
99

1010
- [Processing Sensitive Data](sensitive_data.md)
11-
Summarizes key requirements and scenarios for working with sensitive human data in cloud contexts, including relevant legal/regulatory frameworks (e.g., GDPR, EHDS) and typical secure analysis environments (TEE/SPE/TRE).
11+
Summarizes key requirements and scenarios for working with sensitive human data in cloud contexts, including relevant legal/regulatory frameworks (e.g., GDPR, EHDS) and typical secure analysis environments (TEE/SPE/TRE).
1212

1313
- [User Stories](user_stories.md)
14-
Collects user stories that describe common journeys (access to services, access to data, and running analyses). Use these to align expectations between researchers, service providers, and data controllers.
15-
16-
## Where to go next
17-
18-
If you are new to the project, start with the user stories to get an end-to-end picture, then dive into the GA4GH overview for the technical standards. If you handle human data (or build platforms that do), read the sensitive data page early to avoid design decisions that conflict with governance and compliance requirements.
14+
Collects user stories that describe common journeys (access to services, access to data, and running analyses). Use these to align expectations between researchers, service providers, and data controllers.

docs/tutorials/index.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
# Tutorials
2+
3+
This section contains hands-on, end-to-end tutorials that show how to deploy and use components of the ELIXIR-on-Cloud ecosystem. The guides are written to be actionable: they focus on concrete setups, expected infrastructure, and the sequence of steps needed to run secure analyses.
4+
5+
## In this section
6+
7+
- [Crypt4GH Integration with proTES](crypt4gh_to_protes.md)
8+
Shows a pattern for analyzing encrypted genomic data in the cloud without granting researchers direct access to the plaintext. It combines Crypt4GH encryption with GA4GH TES execution via Funnel and proTES, including automatic decryption inside controlled containers.
9+
10+
- [Analysis of Sensitive Data in Secure Processing Environments (SPE)](sensitive_data_analysis.md)
11+
Walks through a reference setup for an SPE (example: de.NBI Cloud / ELIXIR-DE) using WESkit for workflow submission, a Slurm cluster for execution, and S3-compatible storage for publishing non-sensitive results. It also outlines how LS Login can be used for authentication and authorization.

0 commit comments

Comments
 (0)