default search action
Jim Basney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Md. Arifuzzaman, Brian Bockelman, Jim Basney, Engin Arslan:
Falcon: Fair and Efficient Online File Transfer Optimization. IEEE Trans. Parallel Distributed Syst. 34(8): 2265-2278 (2023) - [c48]Md. Jobair Hossain Faruk, Jim Basney, Jerry Q. Cheng:
Blockchain-Based Decentralized Verifiable Credentials: Leveraging Smart Contracts for Privacy-Preserving Authentication Mechanisms to Enhance Data Security in Scientific Data Access. IEEE Big Data 2023: 5493-5502 - [c47]Suresh Marru, Marlon E. Pierce, Beth Plale, Sudhakar Pamidighantam, Dimuthu Wannipurage, Marcus Christie, Isuru Ranawaka, Eroma Abeysinghe, Rob Quick, Emad Tajkhorshid, Seid Koric, Jim Basney, Mariano Spivak, Barry Isralewitz, Rafael C. Bernardi, Diego Gomes, Giri P. Krishnan, Maxim Bazhenov, Shava Smallen, Amit Majumdar, Anton Arkhipov, Kael Dai, Xiao-Ping Liu, Kenneth Yoshimoto:
Cybershuttle: An End-to-End Cyberinfrastructure Continuum to Accelerate Discovery in Science and Engineering. PEARC 2023: 26-34 - [c46]Md. Jobair Hossain Faruk, Bilash Saha, Jim Basney:
A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data. PEARC 2023: 302-305 - [i6]Md. Jobair Hossain Faruk, Bilash Saha, Jim Basney:
A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data. CoRR abs/2311.13422 (2023) - 2022
- [c45]Isuru Ranawaka, Nuwan Goonasekera, Enis Afgan, Jim Basney, Suresh Marru, Marlon E. Pierce:
Custos Secrets: a Service for Managing User-Provided Resource Credential Secrets for Science Gateways. PEARC 2022: 40:1-40:4 - [c44]Brian Aydemir, Jim Basney, Brian Bockelman, Jeff Gaynor, Derek Weitzel:
SciAuth: A Lightweight End-to-End Capability-Based Authorization Environment for Scientific Computing. PEARC 2022: 45:1-45:5 - 2021
- [i5]Isuru Ranawaka, Samitha Liyanage, Dannon Baker, Alexandru Mahmoud, Juleen Graham, Terry Fleury, Dimuthu Wannipurage, Yu Ma, Enis Afgan, Jim Basney, Suresh Marru, Marlon E. Pierce:
Experiences with Integrating Custos SecurityServices. CoRR abs/2107.04172 (2021) - 2020
- [c43]Jim Basney, Phuong Cao, Terry Fleury:
Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory. DependSys 2020: 119-126 - [c42]Jim Basney:
Fourth Workshop on Trustworthy Scientific Cyberinfrastructure ([email protected]). PEARC Companion 2020: 10:1 - [c41]Isuru Ranawaka, Suresh Marru, Juleen Graham, Aarushi Bisht, Jim Basney, Terry Fleury, Jeff Gaynor, Dimuthu Wannipurage, Marcus Christie, Alexandru Mahmoud, Enis Afgan, Marlon E. Pierce:
Custos: Security Middleware for Science Gateways. PEARC 2020: 278-284 - [c40]You Alex Gao, Jim Basney, Alex Withers:
SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments. PEARC 2020: 465-468 - [c39]Lee Liming, Jim Basney, John-Paul Navarro, Shava Smallen:
Use Case Methodology in XSEDE System Integration. PEARC 2020: 477-480
2010 – 2019
- 2019
- [c38]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. PEARC 2019: 60 - [c37]Alex Withers, Brian Bockelman, Derek Weitzel, Duncan A. Brown, Jason Patton, Jeff Gaynor, Jim Basney, Todd Tannenbaum, You Alex Gao, Zach Miller:
SciTokens: Demonstrating Capability-Based Access to Remote Scientific Data using HTCondor. PEARC 2019: 118:1-118:4 - [i4]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. CoRR abs/1904.05383 (2019) - [i3]Alex Withers, Brian Bockelman, Derek Weitzel, Duncan A. Brown, Jason Patton, Jeff Gaynor, Jim Basney, Todd Tannenbaum, You Alex Gao, Zach Miller:
SciTokens: Demonstrating Capability-Based Access to Remote Scientific Data using HTCondor. CoRR abs/1905.09816 (2019) - 2018
- [c36]Alex Withers, Brian Bockelman, Derek Weitzel, Duncan A. Brown, Jeff Gaynor, Jim Basney, Todd Tannenbaum, Zach Miller:
SciTokens: Capability-Based Secure Access to Remote Scientific Data. PEARC 2018: 24:1-24:8 - [i2]Alex Withers, Brian Bockelman, Derek Weitzel, Duncan A. Brown, Jeff Gaynor, Jim Basney, Todd Tannenbaum, Zach Miller:
SciTokens: Capability-Based Secure Access to Remote Scientific Data. CoRR abs/1807.04728 (2018) - 2014
- [j8]Jim Basney, Terry Fleury, Jeff Gaynor:
CILogon: A federated X.509 certification authority for cyberinfrastructure logon. Concurr. Comput. Pract. Exp. 26(13): 2225-2239 (2014) - [c35]Thejaka Amila Kanewala, Suresh Marru, Jim Basney, Marlon E. Pierce:
A Credential Store for Multi-tenant Science Gateways. CCGRID 2014: 445-454 - [c34]Rion Dooley, Joe Stubbs, Jim Basney:
The MyProxy Gateway. IWSG 2014: 6-11 - [c33]Jim Basney, Jeff Gaynor, Suresh Marru, Marlon E. Pierce, Thejaka Amila Kanewala, Rion Dooley, Joe Stubbs:
Integrating Science Gateways with XSEDE Security: A Survey of Credential Management Approaches. XSEDE 2014: 58:1-58:2 - 2013
- [c32]Jim Basney, Von Welch:
Science gateway security recommendations. CLUSTER 2013: 1-3 - [c31]Jim Basney, Terry Fleury, Jeff Gaynor:
CILogon: a federated X.509 certification authority for cyberinfrastructure logon. XSEDE 2013: 53:1-53:7 - 2012
- [c30]Jim Basney, Randy Butler, Dan Fraser, Suresh Marru, Craig Stewart:
Security for science gateways and campus bridging: XSEDE12 panel. XSEDE 2012: 65:1 - 2011
- [c29]Jim Basney, Rion Dooley, Jeff Gaynor, Suresh Marru, Marlon E. Pierce:
Distributed web security for science gateways. SC-GCE 2011: 13-20 - [c28]Jim Basney, Jeff Gaynor:
An OAuth service for issuing certificates to science gateways for TeraGrid users. TG 2011: 32:1-32:6 - 2010
- [c27]Jim Basney, Terry Fleury, Von Welch:
Federated login to TeraGrid. IDtrust 2010: 1-11 - [c26]Jim Basney, Von Welch, Nancy Wilkins-Diehr:
TeraGrid Science Gateway AAAA Model: implementation and lessons learned. TG 2010: 2:1-2:6
2000 – 2009
- 2009
- [c25]Mehran Ahsant, Jim Basney:
Workflows in Dynamic and Restricted Delegation. ARES 2009: 17-24 - [c24]Mehran Ahsant, Esteban Talavera Gonzalez, Jim Basney:
Security Credential Mapping in Grids. ARES 2009: 481-486 - [c23]Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Michael Freemon, Von Welch, Randy Butler:
Palantir: a framework for collaborative incident response and investigation. IDtrust 2009: 38-51 - [c22]Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana:
Usable secure mailing lists with untrusted servers. IDtrust 2009: 103-116 - 2008
- [j7]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
The Traust Authorization Service. ACM Trans. Inf. Syst. Secur. 11(1): 2:1-2:33 (2008) - [c21]Jim Basney, Stuart Martin, John-Paul Navarro, Marlon E. Pierce, Tom Scavo, Leif Strand, Thomas D. Uram, Nancy Wilkins-Diehr, Wenjun Wu, Choonhan Youn:
The Problem Solving Environments of TeraGrid, Science Gateways, and the Intersection of the Two. eScience 2008: 725-734 - 2007
- [j6]Randy Butler, Mark Servilla, Stuart Gage, Jim Basney, Von Welch, Bill Baker, Terry Fleury, Patrick Duda, David Gehrig, Michael Bletzinger, Jing Tao, D. Michael Freemon:
Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment. Clust. Comput. 10(3): 301-310 (2007) - [j5]Von Welch, Jim Barlow, Jim Basney, Doru Marcusiu, Nancy Wilkins-Diehr:
A AAAA model to support science gateways with community accounts. Concurr. Comput. Pract. Exp. 19(6): 893-904 (2007) - [c20]Himanshu Khurana, Radostina K. Koleva, Jim Basney:
Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems. eScience 2007: 431-439 - [c19]Zach Hill, Jonathan C. Rowanhill, Anh Nguyen-Tuong, Glenn S. Wasson, John C. Knight, Jim Basney, Marty Humphrey:
Meeting virtual organization performance goals through adaptive grid reconfiguration. GRID 2007: 177-184 - [c18]Mehran Ahsant, Jim Basney, S. Lennart Johnsson:
Dynamic, context-aware, least-privilege grid delegation. GRID 2007: 209-216 - [c17]Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill, Jim Basney, Yuliyan Kiryakov, John C. Knight, Anh Nguyen-Tuong, Andrew S. Grimshaw, Marty Humphrey:
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections. HPCC 2007: 260-272 - 2006
- [c16]Randy Butler, Mark Servilla, Stuart Gage, Jim Basney, Von Welch, Bill Baker, Terry Fleury, Patrick Duda, David Gehrig, Michael Bletzinger, Jing Tao, D. Michael Freemon:
CyberInfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment. CLADE 2006: 25-33 - [c15]Himanshu Khurana, Jim Basney, Von Welch, Roy H. Campbell:
Operational Security Requirements for Large Collaborative Compute Infrastructures. CollaborateCom 2006 - [c14]Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee, S. Lennart Johnsson:
Toward an On-Demand Restricted Delegation Mechanism for Grids. GRID 2006: 152-159 - [c13]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: A Trust Negotiation Based Authorization Service. iTrust 2006: 458-462 - [c12]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: a trust negotiation-based authorization service for open systems. SACMAT 2006: 39-48 - [c11]Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch:
Mithril: Adaptable Security for Survivability in Collaborative Computing Sites. SecureComm 2006: 1-7 - [c10]Terry Fleury, Jim Basney, Von Welch:
Single sign-on for java web start applications using myproxy. SWS 2006: 95-102 - 2005
- [j4]Bruce Beckles, Von Welch, Jim Basney:
Mechanisms for increasing the usability of grid security. Int. J. Hum. Comput. Stud. 63(1-2): 74-101 (2005) - [j3]Jim Basney, Marty Humphrey, Von Welch:
The MyProxy online credential repository. Softw. Pract. Exp. 35(9): 801-816 (2005) - [j2]Marty Humphrey, Jim Basney, Jim Jokl:
The case for using Bridge Certificate Authorities for Grid computing. Softw. Pract. Exp. 35(9): 817-826 (2005) - [c9]Daniel Kouril, Jim Basney:
A credential renewal service for long-running jobs. GRID 2005: 63-68 - [c8]Jonathan Martin, Jim Basney, Marty Humphrey:
Extending Existing Campus Trust Relationships to the Grid Through the Integration of Pubcookie and MyProxy. International Conference on Computational Science (1) 2005: 501-508 - [c7]Andrew S. Grimshaw, Marty A. Humphrey, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill, Glenn S. Wasson, Jim Basney:
The Development of Dependable and Survivable Grids. International Conference on Computational Science (2) 2005: 729-737 - [c6]Himanshu Khurana, Rafael Bonilla, Adam J. Slagell, Raja Afandi, Hyung-Seok Hahm, Jim Basney:
Scalable Group Key Management with Partially Trusted Controllers. ICN (2) 2005: 662-672 - [c5]David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam:
CredEx: User-Centric Credential Management for Grid and Web Services. ICWS 2005: 149-156 - [i1]Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, Marianne Winslett:
Negotiating Trust on the Grid. Semantic Grid 2005 - 2004
- [c4]Markus Lorch, Jim Basney, Dennis G. Kafura:
A hardware-secured credential repository for Grid PKIs. CCGRID 2004: 640-647 - 2001
- [c3]Douglas Thain, Jim Basney, Se-Chang Son, Miron Livny:
The Kangaroo Approach to Data Movement on the Grid. HPDC 2001: 325-333 - 2000
- [c2]Jim Basney, Miron Livny:
Managing Network Resources in Condor. HPDC 2000: 298-299
1990 – 1999
- 1999
- [j1]Jim Basney, Miron Livny:
Improving Goodput by Coscheduling CPU and Network Capacity. Int. J. High Perform. Comput. Appl. 13(3): 220-230 (1999) - [c1]Jim Basney, Rajesh Raman, Miron Livny:
High Throughput Monte Carlo. PP 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint