Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Basney, Jim"'
Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is
Externí odkaz:
http://arxiv.org/abs/2311.13422
Autor:
Ranawaka, Isuru, Liyanage, Samitha, Baker, Dannon, Mahmoud, Alexandru, Graham, Juleen, Fleury, Terry, Wannipurage, Dimuthu, Ma, Yu, Afgan, Enis, Basney, Jim, Marru, Suresh, Pierce, Marlon
Science gateways are user-facing cyberinfrastruc-ture that provide researchers and educators with Web-basedaccess to scientific software, computing, and data resources.Managing user identities, accounts, and permissions are essentialtasks for science
Externí odkaz:
http://arxiv.org/abs/2107.04172
Autor:
Withers, Alex, Bockelman, Brian, Weitzel, Derek, Brown, Duncan, Patton, Jason, Gaynor, Jeff, Basney, Jim, Tannenbaum, Todd, Gao, You Alex, Miller, Zach
The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows t
Externí odkaz:
http://arxiv.org/abs/1905.09816
Autor:
Adams, Andrew, Avila, Kay, Basney, Jim, Brunson, Dana, Cowles, Robert, Dopheide, Jeannette, Fleury, Terry, Heymann, Elisa, Hudson, Florence, Jackson, Craig, Kiser, Ryan, Krenz, Mark, Marsteller, Jim, Miller, Barton P., Peisert, Sean, Russell, Scott, Sons, Susan, Welch, Von, Zage, John
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence. Trusted CI is an effort to address cybersecurity fo
Externí odkaz:
http://arxiv.org/abs/1904.05383
Autor:
Dack Thomas, Agostini Federica, Basney Jim, Cornwall Linda, De Stefano Jr John Steven, Dykstra Dave, Giacomini Francesco, Litmaath Maarten, Miccoli Roberta, Sallé Mischa, Short Hannah, Vianello Enrico
Publikováno v:
EPJ Web of Conferences, Vol 295, p 04054 (2024)
Since 2017, the Worldwide LHC Computing Grid (WLCG) has been working towards enabling token-based authentication and authorization throughout its entire middleware stack. Following the initial publication of the WLCG Token Schema v1.0 in 2019, OAuth2
Externí odkaz:
https://doaj.org/article/095728f3701d49fda0f9ddbdeafae841
Autor:
Withers, Alex, Bockelman, Brian, Weitzel, Derek, Brown, Duncan, Gaynor, Jeff, Basney, Jim, Tannenbaum, Todd, Miller, Zach
The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows t
Externí odkaz:
http://arxiv.org/abs/1807.04728
Autor:
Jurić, Mario, Kantor, Jeffrey, Lim, K-T, Lupton, Robert H., Dubois-Felsmann, Gregory, Jenness, Tim, Axelrod, Tim S., Aleksić, Jovan, Allsman, Roberta A., AlSayyad, Yusra, Alt, Jason, Armstrong, Robert, Basney, Jim, Becker, Andrew C., Becla, Jacek, Bickerton, Steven J., Biswas, Rahul, Bosch, James, Boutigny, Dominique, Kind, Matias Carrasco, Ciardi, David R., Connolly, Andrew J., Daniel, Scott F., Daues, Gregory E., Economou, Frossie, Chiang, Hsin-Fang, Fausti, Angelo, Fisher-Levine, Merlin, Freemon, D. Michael, Gee, Perry, Gris, Philippe, Hernandez, Fabio, Hoblitt, Joshua, Ivezić, Željko, Jammes, Fabrice, Jevremović, Darko, Jones, R. Lynne, Kalmbach, J. Bryce, Kasliwal, Vishal P., Krughoff, K. Simon, Lang, Dustin, Lurie, John, Lust, Nate B., Mullally, Fergal, MacArthur, Lauren A., Melchior, Peter, Moeyens, Joachim, Nidever, David L., Owen, Russell, Parejko, John K, Peterson, J. Matt, Petravick, Donald, Pietrowicz, Stephen R., Price, Paul A., Reiss, David J., Shaw, Richard A., Sick, Jonathan, Slater, Colin T., Strauss, Michael A., Sullivan, Ian S., Swinbank, John D., Van Dyk, Schuyler, Vujčić, Veljko, Withers, Alexander, Yoachim, Peter
The Large Synoptic Survey Telescope (LSST) is a large-aperture, wide-field, ground-based survey system that will image the sky in six optical bands from 320 to 1050 nm, uniformly covering approximately $18,000$deg$^2$ of the sky over 800 times. The L
Externí odkaz:
http://arxiv.org/abs/1512.07914
Publikováno v:
EPJ Web of Conferences, Vol 214, p 04014 (2019)
Outside the HEP computing ecosystem, it is vanishingly rare to encounter user X509 certificate authentication (and proxy certificates are even more rare). The web never widely adopted the user certificate model, but increasingly sees the need for fed
Externí odkaz:
https://doaj.org/article/986ccf83635142a9ab47e50781cf3130
This is Trusted CI's second Broader Impacts Report. Trusted CI published its first Impacts Report in 2018. This report provides updated statistics about Trusted CI's impacts on NSF projects since 2012, with a focus on impacts since 2019 under the cur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1d3a6c01ba682a844b0a1d3d9c8d8ed3
Autor:
Anderson, Jason, Basney, Jim, Benzel, Terry, Gosain, Abhimanyu, Keahey, Kate, Ricci, Robert, Tavares, Mauricio, Zage, John
The 2021 NSF Summit Workshop on Testbed Facility Security was held on Monday, October 18, 2021, from 1pm to 5pm Eastern Time as part of the 2021 NSF Cybersecurity Summit. Testbed facilities, such as Chameleon, CloudLab, DETER, FABRIC, GENI, and PAWR,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::088d653dd00daa0370f1996435b3efa5