50 results on '"Basney, Jim"'
Search Results
2. A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data
3. Cybershuttle: An End-to-End Cyberinfrastructure Continuum to Accelerate Discovery in Science and Engineering
4. SciAuth: A Lightweight End-to-End Capability-Based Authorization Environment for Scientific Computing
5. Custos Secrets: a Service for Managing User-Provided Resource Credential Secrets for Science Gateways
6. Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory
7. Fourth Workshop on Trustworthy Scientific Cyberinfrastructure (TrustedCI@PEARC20)
8. Use Case Methodology in XSEDE System Integration
9. SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments
10. Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
11. Traust: A Trust Negotiation Based Authorization Service
12. The Development of Dependable and Survivable Grids
13. Scalable Group Key Management with Partially Trusted Controllers
14. Extending Existing Campus Trust Relationships to the Grid Through the Integration of Pubcookie and MyProxy
15. CILogon: Enabling Federated Identity and Access Management for Scientific Collaborations
16. SciTokens
17. Trusted CI Experiences in Cybersecurity and Service to Open Science
18. Capability-Based Authorization for HEP
19. SciTokens
20. OSG PKI Transition: Experiences and Lessons Learned
21. Integrating Science Gateways with XSEDE Security
22. The MyProxy Gateway
23. A Credential Store for Multi-tenant Science Gateways
24. CILogon: A federated X.509 certification authority for cyberinfrastructure logon
25. CILogon
26. Security for science gateways and campus bridging
27. Distributed web security for science gateways
28. An OAuth service for issuing certificates to science gateways for TeraGrid users
29. TeraGrid Science Gateway AAAA Model
30. Federated login to TeraGrid
31. Palantir
32. Usable secure mailing lists with untrusted servers
33. Workflows in Dynamic and Restricted Delegation
34. Security Credential Mapping in Grids
35. The Problem Solving Environments of TeraGrid, Science Gateways, and the Intersection of the Two
36. The Traust Authorization Service
37. Dynamic, context-aware, least-privilege grid delegation
38. Meeting virtual organization performance goals through adaptive grid reconfiguration
39. Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment
40. Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems
41. Single sign-on for java web start applications using myproxy
42. Operational Security Requirements for Large Collaborative Compute Infrastructures
43. Mithril: Adaptable Security for Survivability in Collaborative Computing Sites
44. Traust
45. Toward an On-Demand Restricted Delegation Mechanism for Grids
46. Mechanisms for increasing the usability of grid security
47. The case for using Bridge Certificate Authorities for Grid computing
48. The MyProxy online credential repository
49. Utilizing widely distributed computational resources efficiently with execution domains
50. Improving Goodput by Coscheduling CPU and Network Capacity
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.