Skip to main content

Showing 1–5 of 5 results for author: Basney, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.13422  [pdf

    cs.CR cs.CY cs.IR

    A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data

    Authors: Md Jobair Hossain Faruk, Bilash Saha, Jim Basney

    Abstract: Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authentic… ▽ More

    Submitted 28 August, 2023; originally announced November 2023.

    Comments: ACM Practice & Experience in Advanced Research Computing (PEARC) 2023

  2. arXiv:2107.04172  [pdf, other

    cs.DC

    Experiences with Integrating Custos SecurityServices

    Authors: Isuru Ranawaka, Samitha Liyanage, Dannon Baker, Alexandru Mahmoud, Juleen Graham, Terry Fleury, Dimuthu Wannipurage, Yu Ma, Enis Afgan, Jim Basney, Suresh Marru, Marlon Pierce

    Abstract: Science gateways are user-facing cyberinfrastruc-ture that provide researchers and educators with Web-basedaccess to scientific software, computing, and data resources.Managing user identities, accounts, and permissions are essentialtasks for science gateways, and gateways likewise must man-age secure connections between their middleware and remoteresources. The Custos project is an effort to buil… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Comments: 9 pages, 12 figures

  3. SciTokens: Demonstrating Capability-Based Access to Remote Scientific Data using HTCondor

    Authors: Alex Withers, Brian Bockelman, Derek Weitzel, Duncan Brown, Jason Patton, Jeff Gaynor, Jim Basney, Todd Tannenbaum, You Alex Gao, Zach Miller

    Abstract: The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows to fail to fetch needed input data or store valuable scientific results, distracting scientists from their research by requiring them to diagnose the p… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

    Comments: 8 pages, 3 figures, PEARC '19: Practice and Experience in Advanced Research Computing, July 28-August 1, 2019, Chicago, IL, USA. arXiv admin note: substantial text overlap with arXiv:1807.04728

  4. Trusted CI Experiences in Cybersecurity and Service to Open Science

    Authors: Andrew Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage

    Abstract: This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence. Trusted CI is an effort to address cybersecurity for the open science community through a single organization that provides leadership, training, consulting, and knowledge to that community. The articl… ▽ More

    Submitted 7 August, 2019; v1 submitted 10 April, 2019; originally announced April 2019.

    Comments: 8 pages, PEARC '19: Practice and Experience in Advanced Research Computing, July 28-August 1, 2019, Chicago, IL, USA

  5. SciTokens: Capability-Based Secure Access to Remote Scientific Data

    Authors: Alex Withers, Brian Bockelman, Derek Weitzel, Duncan Brown, Jeff Gaynor, Jim Basney, Todd Tannenbaum, Zach Miller

    Abstract: The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows to fail to fetch needed input data or store valuable scientific results, distracting scientists from their research by requiring them to diagnose the p… ▽ More

    Submitted 12 July, 2018; originally announced July 2018.

    Comments: 8 pages, 6 figures, PEARC '18: Practice and Experience in Advanced Research Computing, July 22--26, 2018, Pittsburgh, PA, USA