2009 | ||
---|---|---|
28 | Mehran Ahsant, Jim Basney: Workflows in Dynamic and Restricted Delegation. ARES 2009: 17-24 | |
27 | Mehran Ahsant, Esteban Talavera Gonzalez, Jim Basney: Security Credential Mapping in Grids. ARES 2009: 481-486 | |
26 | Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana: Usable secure mailing lists with untrusted servers. IDtrust 2009: 103-116 | |
25 | Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Michael Freemon, Von Welch, Randy Butler: Palantir: a framework for collaborative incident response and investigation. IDtrust 2009: 38-51 | |
2008 | ||
24 | Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch: The Traust Authorization Service. ACM Trans. Inf. Syst. Secur. 11(1): (2008) | |
2007 | ||
23 | Zach Hill, Jonathan C. Rowanhill, Anh Nguyen-Tuong, Glenn S. Wasson, John C. Knight, Jim Basney, Marty Humphrey: Meeting virtual organization performance goals through adaptive grid reconfiguration. GRID 2007: 177-184 | |
22 | Mehran Ahsant, Jim Basney, S. Lennart Johnsson: Dynamic, context-aware, least-privilege grid delegation. GRID 2007: 209-216 | |
21 | Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill, Jim Basney, Yuliyan Kiryakov, John C. Knight, Anh Nguyen-Tuong, Andrew S. Grimshaw, Marty Humphrey: Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections. HPCC 2007: 260-272 | |
20 | Himanshu Khurana, Radostina K. Koleva, Jim Basney: Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems. eScience 2007: 431-439 | |
19 | Randy Butler, Mark Servilla, Stuart Gage, Jim Basney, Von Welch, Bill Baker, Terry Fleury, Patrick Duda, David Gehrig, Michael Bletzinger, Jing Tao, D. Michael Freemon: Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment. Cluster Computing 10(3): 301-310 (2007) | |
18 | Von Welch, Jim Barlow, Jim Basney, Doru Marcusiu, Nancy Wilkins-Diehr: A AAAA model to support science gateways with community accounts. Concurrency and Computation: Practice and Experience 19(6): 893-904 (2007) | |
2006 | ||
17 | Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee, S. Lennart Johnsson: Toward an On-Demand Restricted Delegation Mechanism for Grids. GRID 2006: 152-159 | |
16 | Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch: Traust: a trust negotiation-based authorization service for open systems. SACMAT 2006: 39-48 | |
15 | Terry Fleury, Jim Basney, Von Welch: Single sign-on for java web start applications using myproxy. SWS 2006: 95-102 | |
14 | Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch: Traust: A Trust Negotiation Based Authorization Service. iTrust 2006: 458-462 | |
2005 | ||
13 | Daniel Kouril, Jim Basney: A credential renewal service for long-running jobs. GRID 2005: 63-68 | |
12 | Himanshu Khurana, Rafael Bonilla, Adam J. Slagell, Raja Afandi, Hyung-Seok Hahm, Jim Basney: Scalable Group Key Management with Partially Trusted Controllers. ICN (2) 2005: 662-672 | |
11 | David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam: CredEx: User-Centric Credential Management for Grid and Web Services. ICWS 2005: 149-156 | |
10 | Jonathan Martin, Jim Basney, Marty Humphrey: Extending Existing Campus Trust Relationships to the Grid Through the Integration of Pubcookie and MyProxy. International Conference on Computational Science (1) 2005: 501-508 | |
9 | Andrew S. Grimshaw, Marty A. Humphrey, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill, Glenn S. Wasson, Jim Basney: The Development of Dependable and Survivable Grids. International Conference on Computational Science (2) 2005: 729-737 | |
8 | Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, Marianne Winslett: Negotiating Trust on the Grid. Semantic Grid 2005 | |
7 | Bruce Beckles, Von Welch, Jim Basney: Mechanisms for increasing the usability of grid security. International Journal of Man-Machine Studies 63(1-2): 74-101 (2005) | |
6 | Jim Basney, Marty Humphrey, Von Welch: The MyProxy online credential repository. Softw., Pract. Exper. 35(9): 801-816 (2005) | |
5 | Marty Humphrey, Jim Basney, Jim Jokl: The case for using Bridge Certificate Authorities for Grid computing. Softw., Pract. Exper. 35(9): 817-826 (2005) | |
2004 | ||
4 | Markus Lorch, Jim Basney, Dennis G. Kafura: A hardware-secured credential repository for Grid PKIs. CCGRID 2004: 640-647 | |
2001 | ||
3 | Douglas Thain, Jim Basney, Se-Chang Son, Miron Livny: The Kangaroo Approach to Data Movement on the Grid. HPDC 2001: 325-333 | |
2000 | ||
2 | Jim Basney, Miron Livny: Managing Network Resources in Condor. HPDC 2000: 298-299 | |
1999 | ||
1 | Jim Basney, Rajesh Raman, Miron Livny: High Throughput Monte Carlo. PPSC 1999 |