-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
1365 lines (1364 loc) · 64.8 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
---
layout: home
---
<p>
<img src="Basney.jpeg" alt="" width="144" height="192">
<p>
Principal Research Scientist<BR>
<a href="https://security.ncsa.illinois.edu/">Cybersecurity</a><br>
<a href="https://www.ncsa.illinois.edu/">National Center for Supercomputing Applications</a><BR>
<a href="https://illinois.edu/">University of Illinois at Urbana-Champaign</a><BR>
<P>
Email: <a href="mailto:[email protected]">[email protected]</a><br>
GitHub: <a href="https://github.com/jbasney/">jbasney</a><br>
ORCID: <a href="https://orcid.org/0000-0002-0139-0640">https://orcid.org/0000-0002-0139-0640</a><br>
<h2 id="projects">Current Projects</h2>
<UL>
<li><a href="https://www.cilogon.org/">CILogon</a>
<li><a href="https://cybershuttle.org/">Cybershuttle</a>
<li><a href="https://sciauth.org/">SciAuth</a>
<li><a href="https://scitokens.org/">SciTokens</a>
<li><a href="https://trustedci.org/">Trusted CI</a>
</UL>
<h2 id="pubs">Publications</h2>
<p>
Please contact me for a free copy of any publication listed below.
<ul>
<li>M. J. H. Faruk, J. Basney and J. Q. Cheng,
"Blockchain-Based Decentralized Verifiable Credentials: Leveraging Smart Contracts for Privacy-Preserving
Authentication Mechanisms to Enhance Data Security in Scientific Data Access," 2023 IEEE International
Conference on Big Data (BigData), Sorrento, Italy, 2023, pp. 5493-5502, doi: 10.1109/BigData59044.2023.10386360.
<a href="https://doi.org/mdnq">https://doi.org/mdnq</a>
<li>Md Jobair Hossain Faruk, Bilash Saha, and Jim Basney. 2023. A Comparative Analysis Between SciTokens,
Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to
Scientific Data. In Practice and Experience in Advanced Research Computing (PEARC ’23), July 23–27, 2023,
Portland, OR, USA. ACM, New York, NY, USA, 302–305.
<a href="https://doi.org/ksxt">https://doi.org/ksxt</a>
<li>Suresh Marru, Marlon Pierce, Beth Plale, Sudhakar Pamidighantam, Dimuthu Wannipurage, Marcus Christie, Isuru Ranawaka, Eroma Abeysinghe, Rob Quick, Emad Tajkhorshid, Seid Koric, Jim Basney, Mariano Spivak, Barry Isralewitz, Rafael Bernardi, Diego Gomes, Giri Krishnan, Maxim Bazhenov, Shava Smallen, Amit Majumdar, Anton Arkhipov, Kael Dai and Xiao-Ping Liu.
2023. Cybershuttle: An end-to-end Cyberinfrastructure Continuum to accelerate Discovery in Science and Engineering.
In Practice and Experience in Advanced Research Computing (PEARC ’23), July 23–27, 2023,
Portland, OR, USA. ACM, New York, NY, USA, 26–34.
<a href="https://doi.org/ksxw">https://doi.org/ksxw</a>
<li>Md Arifuzzaman, Brian Bockelman, Jim Basney, and Engin Arslan.
Falcon: Fair and Efficient Online File Transfer Optimization.
IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 34, no. 8, pp. 2265-2278, August 2023.
<a href="https://doi.org/kdps">https://doi.org/kdps</a>
<li>Brian Aydemir, Jim Basney, Brian Bockelman, Jeff Gaynor and Derek Weitzel. 2022.
SciAuth: A Lightweight End-to-End Capability-Based Authorization Environment for Scientific Computing.
In Practice and Experience in Advanced Research Computing (PEARC '22),
July 10–14, 2022, Boston, MA, USA. ACM, New York, NY, USA.
<a href="https://doi.org/h6g4">https://doi.org/h6g4</a>
<a href="SciAuth_PEARC22_AuthorVersion.pdf">[pdf]</a>
<li>Isuru Ranawaka, Nuwan Goonasekara, Enis Afgan, Jim Basney, Suresh Marru and Marlon Pierce. 2022.
Custos Secrets: a Service for Managing User-Provided Resource Credential Secrets for Science Gateways.
In Practice and Experience in Advanced Research Computing (PEARC '22),
July 10–14, 2022, Boston, MA, USA. ACM, New York, NY, USA.
<a href="https://doi.org/h82x">https://doi.org/h82x</a>
<li>Isuru Ranawaka, Samitha Liyanage, Dannon Baker, Alexandru Mahmoud, Juleen Graham, Terry Fleury,
Dimuthu Wannipurage, Yu Ma, Enis Afgan, Jim Basney, Suresh Marru, and Marlon Pierce. 2021.
Science Gateway Integration Examples with the Custos Security Service.
8th International Workshop on HPC User Support Tools
(<a href="https://hust-workshop.github.io/">HUST</a>),
November 2021.
<a href="https://doi.org/h82z">https://doi.org/h82z</a>
<li>Jim Basney, Phuong Cao, and Terry Fleury, "Investigating Root
Causes of Authentication Failures Using a SAML and OIDC
Observatory," IEEE 6th International Conference on Dependability in
Sensor, Cloud and Big Data Systems and Applications (DependSys),
December 2020.
<a href="https://doi.org/h822">https://doi.org/h822</a>
<a href="https://github.com/cilogon/DependSys2020">[data]</a>
<li>Isuru Ranawaka, Suresh Marru, Juleen Graham, Aarushi Bisht, Jim
Basney, Terry Fleury, Jeff Gaynor, Dimuthu Wannipurage, Marcus
Christie, Alexandru Mahmoud, Enis Afgan, and Marlon
Pierce. 2020. Custos: Security Middleware for Science Gateways. In
Practice and Experience in Advanced Research Computing (PEARC '20), July
26–30, 2020, Portland, OR, USA. ACM, New York, NY, USA, 13 pages.
<a href="https://doi.org/h823">https://doi.org/h823</a>
<li>You Alex Gao, Jim Basney, and Alex Withers. 2020. SciTokens SSH:
Token-based Authentication for Remote Login to Scientific
Computing Environments. In Practice and Experience in Advanced
Research Computing (PEARC ’20), July 26-30, 2020, Portland, OR, USA.
ACM, New York, NY, USA, 7 pages.
<a href="https://doi.org/h824">https://doi.org/h824</a>
<li>Lee Liming, Jim Basney, John Paul Navarro, and Shava
Smallen. 2020. Use Case Methodology in XSEDE System Integration. In
Practice and Experience in Advanced Research Computing (PEARC ’20), July
26–30, 2020, Portland, OR, USA. ACM, New York, NY, USA, 7 pages.
<a href="https://doi.org/h9xz">https://doi.org/h9xz</a>
<li>Jim Basney, Heather Flanagan, Terry Fleury, Jeff Gaynor,
Scott Koranda, and Benn Oshrin.
CILogon: Enabling Federated Identity and Access
Management for Scientific Collaborations.
In Proceedings of the International Symposium on Grids and Clouds (ISGC),
PoS(ISGC2019)031, 2019.
<a href="https://doi.org/h6hb">https://doi.org/h6hb</a>
<li>Andrew Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles,
Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence Hudson,
Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton
P. Miller, Sean Piesert, Scott Russell, Susan Sons, Von Welch, and
John Zage. 2019. Trusted CI Experiences in Cybersecurity and Service
to Open Science. In PEARC'19: Practice and Experience in Advanced
Research Computing, July 28-August 1, 2019, Chicago, IL, USA. ACM,
New York, NY, USA, 8 pages.
<a href="https://doi.org/h9x2">https://doi.org/h9x2</a>
<a href="https://arxiv.org/abs/1904.05383">[pre-print]</a>
<li>Alex Withers, Brian Bockelman, Derek Weitzel, Duncan Brown, Jason
Patton, Jeff Gaynor, Jim Basney, Todd Tannenbaum, You Alex Gao, and
Zach Miller. 2019. SciTokens: Demonstrating Capability-Based Access
to Remote Scientific Data using HTCondor. In Practice and Experience
in Advanced Research Computing (PEARC ’19), July 28-August 1, 2019,
Chicago, IL, USA. ACM, New York, NY, USA, 4 pages.
<a href="https://doi.org/h9x3">https://doi.org/h9x3</a>
<a href="https://arxiv.org/abs/1905.09816">[pre-print]</a>
<li>Derek Weitzel, Brian Bockelman, Jim Basney, Todd Tannenbaum, Zach
Miller, and Jeff Gaynor. Capability-Based Authorization for HEP. In
23rd International Conference on Computing in High Energy and
Nuclear Physics (CHEP 2018), July 9-13, 2018, Sofia, Bulgaria.
<a href="https://doi.org/h9x4">https://doi.org/h9x4</a>
<li>Alex Withers, Brian Bockelman, Derek Weitzel, Duncan A. Brown,
Jeff Gaynor, Jim Basney, Todd Tannenbaum, Zach Miller,
"SciTokens: Capability-Based Secure Access to Remote Scientific Data",
PEARC '18: Practice and Experience in Advanced Research Computing,
July 2018, Pittsburgh, PA, USA.
<a href="https://doi.org/gks7cw">https://doi.org/gks7cw</a>
<a href="https://arxiv.org/abs/1807.04728">[pre-print]</a>
<li>Jim Basney, Terry Fleury, and Jeff Gaynor,
"CILogon: A Federated X.509 Certification Authority for
CyberInfrastructure Logon,"
Concurrency and Computation: Practice and Experience,
Volume 26, Issue 13, pages 2225-2239,
September 2014.
<a href="https://doi.org/f6dqgk">https://doi.org/f6dqgk</a>
<li>Jim Basney, Rion Dooley, Jeff Gaynor, Thejaka Amila Kanewala,
Suresh Marru, Marlon Pierce, and Joe Stubbs,
"Integrating Science Gateways with XSEDE Security: A Survey of
Credential Management Approaches,"
XSEDE Conference, July 2014, Atlanta, GA.
<a href="https://doi.org/h9x5">https://doi.org/h9x5</a>
<li>Rion Dooley, Joe Stubbs, and Jim Basney,
"The MyProxy Gateway,"
<a href="https://sites.google.com/a/my.westminster.ac.uk/iwsg2014/">International Workshop on Science Gateways</a>,
June 2014, Dublin, Ireland.
<a href="https://doi.org/h9x6">https://doi.org/h9x6</a>
<li>Thejaka Amila Kanewala, Suresh Marru, Jim Basney, and Marlon Pierce,
"A Credential Store for Multi-Tenant Science Gateways,"
International Symposium on Cluster, Cloud and Grid Computing (CCGrid),
May 2014, Chicago, IL.
<a href="https://doi.org/h9x7">https://doi.org/h9x7</a>
<a href="https://hdl.handle.net/2022/17379">https://hdl.handle.net/2022/17379</a>
<li>Jim Basney and Von Welch,
"Science Gateway Security Recommendations,"
Science Gateway Institute Workshop,
September 2013, Indianapolis, IN.
<a href="https://doi.org/h9x8">https://doi.org/h9x8</a>
<a href="201309-gwsec.pdf">[pdf]</a>
<a href="201309-gwsec.pptx">[pptx]</a>
<li>Jim Basney, Terry Fleury, and Jeff Gaynor,
"CILogon: A Federated X.509 Certification Authority for
CyberInfrastructure Logon,"
XSEDE Conference,
July 2013, San Diego, CA.
<a href="https://doi.org/h9x9">https://doi.org/h9x9</a>
(Best Technology Paper)
<a href="cilogon-xsede13.pdf">[pdf]</a>
<a href="basney-cilogon-xsede13.pdf">[slides]</a>
<a href="cilogon-poster-201307.pdf">[poster]</a>
<li>Jim Basney, Rion Dooley, Jeff Gaynor, Suresh Marru, and Marlon Pierce,
"Distributed Web Security for Science Gateways,"
Gateway Computing Environments Workshop (GCE11),
November 17, 2011, Seattle, WA.
<a href="https://doi.org/fxj858">https://doi.org/fxj858</a>
<li>Jim Basney and Jeff Gaynor,
"An OAuth Service for Issuing Certificates to Science Gateways for
TeraGrid Users,"
TeraGrid Conference,
July 18-21, 2011, Salt Lake City, UT.
<a href="https://doi.org/bw3dnd">https://doi.org/bw3dnd</a>
<a href="tg11-gateway-oauth-basney.pptx">[slides]</a>
<li>Jim Basney, Von Welch, and Nancy Wilkins-Diehr,
"TeraGrid Science Gateway AAAA Model: Implementation and Lessons Learned,"
TeraGrid Conference,
August 2-5, 2010, Pittsburgh, PA.
<a href="https://doi.org/bzvm2j">https://doi.org/bzvm2j</a>
(Best Paper: Gateways Track)
<a href="tg10-gateway-aaaa.pptx">[slides]</a>
<li>Jim Basney, Terry Fleury, and Von Welch,
"Federated Login to TeraGrid,"
9th Symposium on Identity and Trust on the Internet (IDtrust 2010),
Gaithersburg, MD, April 2010.
<a href="https://doi.org/c26zcf">https://doi.org/c26zcf</a>
<a href="tgfed-slides.pdf">[slides]</a>
<a href="tgfed-poster-201004.pdf">[poster]</a>
<li>Mehran Ahsant and Jim Basney,
"Workflows in Dynamic and Restricted Delegation,"
Journal of Information System Security
(<a href="https://www.jissec.org/Contents/V5/N4/V5N4-Ahsant.html">JISSec</a>),
Volume 5, Number 4 (2009), Pages 3-26, ISSN 1551-0123.
<em>Note: This is an extended version of an ARES/CISIS 2009 paper.</em>
<li>Bobba, R., Muggli, J., Pant, M., Basney, J., and Khurana, H.
Usable secure mailing lists with untrusted servers.
In Proceedings of the 8th Symposium on Identity and Trust on the
Internet (Gaithersburg, Maryland, April 14 - 16, 2009).
K. Seamons, N. McBurnett, and T. Polk, Eds.
IDtrust '09, vol. 373. ACM, New York, NY, 103-116.
<a href="https://doi.org/bdngz7">https://doi.org/bdngz7</a>
<li>Khurana, H., Basney, J., Bakht, M., Freemon, M., Welch, V., and Butler, R.
Palantir: a framework for collaborative incident response and investigation.
In Proceedings of the 8th Symposium on Identity and Trust on the Internet
(Gaithersburg, Maryland, April 14 -16, 2009).
K. Seamons, N. McBurnett, and T. Polk, Eds. IDtrust '09,
vol. 373. ACM, New York, NY, 38-51.
<a href="https://doi.org/ccxfr5">https://doi.org/ccxfr5</a>
<li> Mehran Ahsant and Jim Basney,
"Workflows in Dynamic and Restricted Delegation,"
Proceedings of the 4th International Conference on Availability,
Reliability and Security (ARES/CISIS 2009),
Fukuoka, Japan, March 2009.
<a href="https://doi.org/cvhm3q">https://doi.org/cvhm3q</a>
<li>Mehran Ahsant, Esteban Tavalera Gonzalez and Jim Basney,
"Security Credential Mapping in Grids,"
Proceedings of the 4th International Conference on Availability,
Reliability and Security (ARES/CISIS 2009),
Fukuoka, Japan, March 2009.
<a href="https://doi.org/bkzrwq">https://doi.org/bkzrwq</a>
<li>Jim Basney, Stuart Martin, JP Navarro, Marlon Pierce, Tom Scavo, Leif
Strand, Tom Uram, Nancy Wilkins-Diehr, Wenjun Wu, and Choonhan Youn,
"The Problem Solving Environments of TeraGrid, Science Gateways, and the
Intersection of the Two,"
Fourth IEEE International Conference on eScience,
December 2008, pages 725-734.
<a href="https://doi.org/bnrb72">https://doi.org/bnrb72</a>
<li>Lee, A., Winslett, M., Basney, J., and Welch, V.
The Traust Authorization Service.
ACM Trans. Inf. Syst. Secur. 11, 1 (Feb. 2008), 1-33.
<a href="https://doi.org/bkzrwq">https://doi.org/bkzrwq</a>
<li>Himanshu Khurana, Radostina Koleva, Jim Basney,
"Performance of Cryptographic Protocols for High-Performance,
High-Bandwidth, High-Latency Grid Systems,"
3rd IEEE International Conference on e-Science and Grid Computing,
Bangalore, India, December 2007.
<a href="https://doi.org/b6b9kc">https://doi.org/b6b9kc</a>
<li>J. Rowanhill, G. Wasson, Z. Hill, J. Basney, Y. Kiryakov, J. Knight,
A. Nguyen-Tuong, A. Grimshaw and M. Humphrey,
"Dynamic System-wide Reconfiguration of Grid Deployments in Response
to Intrusion Detections,"
High Performance Computation Conference (HPCC 2007),
Sept 26-28, 2007. Houston, TX.
<a href="https://doi.org/bdvj7w">https://doi.org/bdvj7w</a>
<a href="ANDREA_GT4_HPCC2007.pdf">[pdf]</a>
<li>Z. Hill, J. Rowanhill, A. Nguyen-Tuong, J. Basney, G. Wasson,
J. Knight and M. Humphrey,
"Meeting Virtual Organization Performance
Goals through Adaptive Grid Reconfiguration,"
8th IEEE/ACM International Conference on Grid Computing (Grid 2007), Austin, TX,
Sept 19-21, 2007.
<a href="https://doi.org/fspfxm">https://doi.org/fspfxm</a>
<li>Mehran Ahsant, Jim Basney, and Lennart Johnsson,
"Dynamic, Context-Aware, Least-Privilege Grid Delegation,"
8th IEEE/ACM International Conference on Grid Computing (Grid 2007), Austin, TX,
Sept 19-21, 2007.
<a href="https://doi.org/d7h4mx">https://doi.org/d7h4mx</a>
<li>Jim Basney and Patrick Duda,
"Clustering the Reliable File Transfer Service,"
TeraGrid Conference,
Madison, WI, June 4-8, 2007.
<a href="rrft.pdf">[pdf]</a>
<a href="rrft.ppt">[ppt]</a>
<li>Von Welch, Jim Barlow, James Basney, Doru Marcusiu, Nancy Wilkins-Diehr,
"A AAAA model to support science gateways with community accounts,"
Concurrency and Computation: Practice and Experience,
Volume 19, Issue 6, March 2007.
<a href="https://doi.org/c59k36">https://doi.org/c59k36</a>
<li>Himanshu Khurana and Jim Basney,
"On the Risks of IBE,"
Proceedings of the International Workshop on Applied PKC,
Dalian, China, November 2006.
<a href="IWAP06IBE.ppt">[ppt]</a>
<a href="10.1.1.86.9742.pdf">[pdf]</a>
<li>Himanshu Khurana, Jim Basney, Von Welch and Roy Campbell,
"Operational Security Requirements for Large Collaborative Compute Infrastructures,"
International Workshop on Trusted Collaboration,
in conjunction with CollaborateCom,
Atlanta, November 2006.
<a href="https://doi.org/c9zkjm">https://doi.org/c9zkjm</a>
<li>Terry Fleury, Jim Basney, and Von Welch,
"Single Sign-On for Java Web Start Applications Using MyProxy,"
Proceedings of the ACM Workshop on Secure Web Services
(associated with the 13th ACM Conference on Computer and
Communications Security),
November 3, 2006.
<a href="https://doi.org/cf4mc9">https://doi.org/cf4mc9</a>
<li>Mehran Ahsant, Jim Basney, Olle Mulmo, Adam Lee and Lennart Johnsson,
"Toward An On-demand Restricted Delegation Mechanism for Grids,"
Proceedings of the 7th IEEE/ACM International Conference on Grid
Computing, Barcelona, September 28th-29th 2006.
<a href="https://doi.org/bh83ks">https://doi.org/bh83ks</a>
<li>Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli,
Meenal Pant, Adam Slagell and Von Welch,
"Mithril: Adaptable Security for Survivability in Collaborative Computing Sites,"
Workshop on Enterprise Network Security (WENS),
in conjunction with SecureComm,
September 2006.
<a href="https://doi.org/bf8f38">https://doi.org/bf8f38</a>
<li>R. Butler, M. Servilla, S. Gage, J. Basney, V. Welch,
B. Baker, T. Fleury, P. Duda, D. Gehrig, M. Bletzinger, J. Tao,
D. M. Freemon,
"CyberInfrastructure for the Analysis of Ecological Acoustic Sensor
Data: A Use Case Study in Grid Deployment,"
Challenges of Large Applications in Distributed Environments (CLADE 2006)
Workshop (associated with the 15th International Symposium on High Performance Distributed Computing),
Paris, France, June 19, 2006.
<a href="https://doi.org/dctwrw">https://doi.org/dctwrw</a>
<li>Adam J. Lee, Marianne Winslett, Jim Basney, and Von Welch,
"Traust: A Trust Negotiation-Based Authorization Service for Open Systems,"
The Eleventh ACM Symposium on Access Control Models and Technologies
(SACMAT), June 2006.
<a href="https://doi.org/c3n2qz">https://doi.org/c3n2qz</a>
<li>A. J. Lee, M. Winslett, J. Basney, and V. Welch, "Traust: A Trust
Negotiation Based Authorization Service," Demonstration Short Paper,
Fourth International Conference on Trust Management (iTrust 2006),
May 2006.
<li>Tom Barton, Jim Basney, Tim Freeman, Tom Scavo, Frank Siebenlist, Von
Welch, Rachana Ananthakrishnan, Bill Baker, Monte Goode, and Kate Keahey,
"Identity Federation and Attribute-based Authorization through
the Globus Toolkit, Shibboleth, Gridshib, and MyProxy,"
5th Annual PKI R&D Workshop,
April 2006.
<a href="gridshib-pki06-final.pdf">[pdf]</a>
<li>Jim Basney,
"MyProxy Protocol,"
Global Grid Forum Experimental Document GFD-E.54,
November 26, 2005.
<a href="https://www.ogf.org/documents/GFD.54.pdf">[pdf]</a>
<li>Daniel Kouril and Jim Basney,
"A Credential Renewal Service for Long-Running Jobs,"
6th IEEE/ACM International Workshop on Grid Computing
(Grid 2005),
Seattle, WA, November 13-14, 2005.
<a href="proxy-renewal.pdf">[pdf]</a>
<li>Bruce Beckles, Von Welch, and Jim Basney,
"Mechanisms for Increasing the Usability of Grid Security,"
International Journal of Human Computer Studies,
Special Issue on HCI Research in Privacy and Security,
Volume 63, Issues 1-2, July 2005, pages 74-101.
<a href="https://doi.org/d6n67j">https://doi.org/d6n67j</a>
<li>Jim Basney, Marty Humphrey, and Von Welch,
"The MyProxy Online Credential Repository,"
Software: Practice and Experience, Volume 35, Issue 9, July 2005,
pages 801-816.
<a href="https://doi.org/ffv2wf">https://doi.org/ffv2wf</a>
<a href="myproxy-spe.pdf">[pdf]</a>
<li>Marty Humphrey, Jim Basney, and Jim Jokl,
"The case for using Bridge Certificate Authorities for Grid Computing,"
Software: Practice and Experience, Volume 35, Issue 9, July 2005,
pages 817-826.
<a href="https://doi.org/dt8g26">https://doi.org/dt8g26</a>
<li>D. Del Vecchio, J. Basney, N. Nagaratnam, and M. Humphrey,
"CredEx: User-Centric Credential Selection and Management for Grid and
Web Services,"
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005),
Orlando, FL, July 12-15, 2005.
<a href="https://doi.org/dhxh83">https://doi.org/dhxh83</a>
<li>Jonathan Martin, Jim Basney, and Marty Humphrey,
"Extending Existing Campus Trust Relationships to the Grid through the
Integration of Pubcookie and MyProxy,"
2005 International Conference on Computational Science (ICCS 2005),
Emory University, Atlanta, GA, May 22-25, 2005.
<a href="https://doi.org/fn9qj8">https://doi.org/fn9qj8</a>
<a href="PubcookieMyproxy.pdf">[pdf]</a>
<li>A. Grimshaw, M. Humphrey, J.C. Knight, A. Nguyen-Tuong, J. Rowanhill, G.
Wasson, and J. Basney,
"The Development of Dependable and Survivable Grids,"
2005 Workshop on Dynamic Data Driven Applications (associated with the 2005
International Conference on Computational Science).
Emory University, Atlanta, GA, May 22-25, 2005.
<a href="https://doi.org/bxjscn">https://doi.org/bxjscn</a>
<a href="DevelopmentDependableSurvivableGrids.pdf">[pdf]</a>
<li>Himanshu Khurana, Rafael Bonilla, Adam Slagell, Raja Afandi,
Hyung-Seok Hahm, and Jim Basney,
"Scalable Group Key Management with Partially Trusted Controllers,"
International Conference on Networking,
Reunion Island, April 2005.
<a href="https://doi.org/b7gqb7">https://doi.org/b7gqb7</a>
<li>Jim Basney, Shiva Shankar Chetan, Feng Qin, Sumin Song, Xiao Tu, and
Marty Humphrey, "An OGSI CredentialManager Service,"
Proceedings of the Workshop on Grid Security Practice and Experience
(UK e-Science Security Task Force), Oxford, 8-9 July 2004.
Published as: University of York Department of Computer Science
Technical Report YCS-2004-380.
<a href="OGSICM.pdf">[pdf]</a>
<a href="OGSICM.ppt">[ppt]</a>
<li>Mehran Ahsant, Jim Basney, and Olle Mulmo,
"Grid Delegation Protocol,"
Proceedings of the Workshop on Grid Security Practice and Experience
(UK e-Science Security Task Force), Oxford, 8-9 July 2004.
Published as: University of York Department of Computer Science
Technical Report YCS-2004-380.
<a href="Grid-Delegation-Protocol.pdf">[pdf]</a>
<li>Jim Jokl, Jim Basney, and Marty Humphrey,
"Experiences using Bridge CAs for Grids,"
Proceedings of the Workshop on Grid Security Practice and Experience
(UK e-Science Security Task Force), Oxford, 8-9 July 2004.
Published as: University of York Department of Computer Science
Technical Report YCS-2004-380.
<a href="BridgeCAGridSecWorkshop2004.pdf">[pdf]</a>
<li>Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, and
Marianne Winslett, "Negotiating Trust on the Grid,"
2nd Workshop on Semantics in P2P and Grid Computing at the Thirteenth
International World Wide Web Conference, New York, May 2004.
<a href="sempgrid.pdf">[pdf]</a>
<li>Markus Lorch, Jim Basney, and Dennis Kafura,
"A Hardware-secured Credential Repository for Grid PKIs,"
4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid2004),
Chicago, Illinois, April 19-22, 2004.
<a href="https://doi.org/fbgrmg">https://doi.org/fbgrmg</a>
<a href="myproxy-ccgrid2004.pdf">[pdf]</a>
<li>Jim Basney, William Yurcik, Rafael Bonilla, and Adam Slagell, "The
Credential Wallet: A Classification of Credential Repositories
Highlighting MyProxy," 31st Research Conference on Communication,
Information and Internet Policy (TPRC 2003),
Arlington, Virginia, September 19-21, 2003.
<a href="credentialwalletTPRC.pdf">[pdf]</a>
</ul>
<h2 id="reports">Technical Reports</h2>
<ul>
<li>J. Dopheide, J. Zage, J. Basney, “Trusted CI Impacts Report”, March 2022.
<a href="https://doi.org/h9zb">https://doi.org/h9zb</a>
<li>Andrew Adams, Kay Avila, Jim Basney, Laura Christopherson, Melissa
Cragin, Jeannette Dopheide, Terry Fleury, Calvin Frye, Florence
Hudson, Manisha Kanodia, Jenna Kim, W. John MacMullen, Mats Rynge,
Scott Sakai, Sandra Thompson, Karan Vahi, and John Zage,
"Guidance for Trustworthy Data Management in Science Projects",
September 2020.
<a href="https://doi.org/h9zc">https://doi.org/h9zc</a>
<li>Andrew Adams, Kay Avila, Jim Basney, Melissa Cragin, Jeannette
Dopheide, Terry Fleury, Florence Hudson, Jenna Kim, W. John
MacMullen, Gary Motz, Sean Peisert, Mats Rynge, Scott Sakai, Sandra
Thompson, Karan Vahi, Wendy Whitcup, and John Zage,
"Scientific Data Security Concerns and Practices: A survey of the
community by the Trustworthy Data Working Group", June 2020.
<a href="https://doi.org/h9zd">https://doi.org/h9zd</a>
<li>Andrew K. Adams, Christopher Weaver, Jim Basney, Joe Breen, John
Zage, Kay Avila, Lincoln Bryant, Mitchell Steinman, Reinhard Gentz,
Robert Gardner, Sean Peisert, Shawn McKee, and Tom Barton, "Trusted
CI SLATE Engagement: Final Report", January 2020.
<a href="https://hdl.handle.net/2142/106019">https://hdl.handle.net/2142/106019</a>
<li>Benn Oshrin, Scott Koranda, and Jim Basney,
"voPerson Object Class and Recommendations",
February 2018.
<a href="https://doi.org/h9zf">https://doi.org/h9zf</a>
<li>"Federated Identity Management for Research Collaborations (Version 2.0)",
June 2018.
<a href="https://doi.org/h9zg">https://doi.org/h9zg</a>
<li>Jeannette Dopheide, John Zage, and Jim Basney,
"The Trusted CI Broader Impacts Project Report",
June 2018.
<a href="https://hdl.handle.net/2022/22148">https://hdl.handle.net/2022/22148</a>
<li>Von Welch, Jim Basney, Craig Jackson, Jim Marsteller, Barton Miller,
"The Trusted CI Vision for an NSF Cybersecurity Ecosystem And
Five-year Strategic Plan (2019-2023)",
April 2018.
<a href="https://hdl.handle.net/2022/22178">https://hdl.handle.net/2022/22178</a>
<li>Jim Basney, Jayashree Ajay Candadai, Terry Fleury, Patrick Gossman,
Mike Gregorowicz, Scott Koranda, Shawn McKee, Ben Meekhof,
Ezra Kissel,
"CTSC-OSiRIS Collaborative Design Review of OSiRIS Access Assertions:
Using the OAuth 2.0 Threat Model (RFC 6819)",
March 2017.
<a href="https://hdl.handle.net/2022/21307">https://hdl.handle.net/2022/21307</a>
<li>T. Barton, J. Basney, D. Groep, N. Harris, L. Johansson, D. Kelsey, S. Koranda, R. Wartel,
A. West, H. Short,
"A Security Incident Response Trust Framework for Federated Identity
(Sirtfi)", 2016.
<a href="https://refeds.org/sirtfi">https://refeds.org/sirtfi</a>
<li>Jim Basney,
"Identity Management Best Practices: A CTSC Blog Series,"
November 2015.
<a href="https://hdl.handle.net/2022/20452">https://hdl.handle.net/2022/20452</a>
<li>Jim Basney, Patrick Duda, Von Welch, and Craig Jackson,
"DataONE: Identity Management System Review,"
October 2013.
<a href="https://hdl.handle.net/2022/16926">https://hdl.handle.net/2022/16926</a>
<li>Jim Basney and Scott Koranda,
"A Study of Three Approaches to International Identity Federation for
the LIGO Project,"
July 2013.
<a href="https://hdl.handle.net/2022/16760">https://hdl.handle.net/2022/16760</a>
<li>Jim Basney and Scott Koranda,
"InCommon Membership in eduGAIN: the LIGO Perspective,"
May 2013.
<a href="https://hdl.handle.net/2022/16690">https://hdl.handle.net/2022/16690</a>
<li>Randy Butler, Von Welch, Jim Basney, Scott Koranda, William
Barnett, and Doug Pearson,
"Report of NSF Workshop Series on Scientific Software Security
Innovation Institute,"
November 2011.
<a href="https://hdl.handle.net/2142/107147">https://hdl.handle.net/2142/107147A</a>
<li>Jim Basney, Scott Koranda, and Von Welch,
"An Analysis of the Benefits and Risks to LIGO When Participating in
Identity Federations,"
October 2011.
<a href="https://dcc.ligo.org/LIGO-G1100964/public">https://dcc.ligo.org/LIGO-G1100964/public</a>
<a href="https://dcc.ligo.org/public/0070/G1100964/002/LIGOIdentityFederationRiskAnalysis.pdf">[pdf]</a>
<li>Randy Butler, Von Welch, Jim Basney, Scott Koranda, William
Barnett, and Doug Pearson,
"Report of NSF Workshop Series on Scientific Software Security
Innovation Institute,"
October 2010.
<a href="https://hdl.handle.net/2142/107146">https://hdl.handle.net/2142/107146</a>
<li>Jim Basney,
"Mapping InCommon Bronze and Silver Identity Assurance Profiles to
TAGPMA SLCS Requirements,"
March 25, 2009.
<a href="incommon-slcs-map.pdf">[pdf]</a>
<li>Himanshu Khurana, Radostina Koleva, Jim Basney,
"Performance of Cryptographic Protocols for High-Performance,
High-Bandwidth, High-Latency Grid Systems,"
NCSA Technical Report, March 2007.
<a href="GridCrypto.pdf">[pdf]</a>
<li>Jim Basney, Roy Campbell, Himanshu Khurana, Von Welch,
"Towards Operational Security for GENI,"
GENI Design Document 06-10, July 2006.
<li>Jim Basney, Von Welch, and Frank Siebenlist,
"A Roadmap for Integration of Grid Security with One-Time Passwords,"
April 18, 2004.
<a href="grid-otp.pdf">[pdf]</a>
<li>Jim Basney and Von Welch,
"GridLogon: A Grid Service for Security Usability,"
Dec 1, 2003.
<a href="grid-logon.pdf">[pdf]</a>
<LI>Jim Basney,
"Proposal: Centralized Key Management for the Alliance PKI,"
November 25, 2002.
<a href="AlliancePKIKeyMgmt.pdf">[pdf]</a>
<LI>Jim Basney, "GSI Online Credential Retrieval - Requirements,"
Global Grid Forum GWD-I (Informational), February 2002.
<a href="draft-ggf-gsi-ocr-requirements-01.pdf">[pdf]</a>
<LI>Jim Basney, "MyProxy Development Plan,"
October 4, 2001.
<a href="myproxy-plan.pdf">[pdf]</a>
<LI>Jim Basney, "Credential Wallets,"
July 22, 2001.
<a href="credmgmt.pdf">[pdf]</a>
</ul>
<h2 id="talks">Presentations</h2>
<ul>
<li>Supporting Science at Scale: CILogon Hosted COmanage for ACCESS,
Internet2 Technology Exchange,
December 11, 2024.
<li>JSON Web Tokens for Science,
Trusted CI Webinar,
August 26, 2024.
<a href="https://hdl.handle.net/2142/124057">[slides]</a>
<a href="https://youtu.be/9DOIIjwVLSA">[video]</a>
<li>Outcomes of the Trusted CI Cybersecurity Framework HPC Cohort,
4th High-Performance Computing Security Workshop,
May 21, 2024.
<a href="202405-trustedci-delta-hpc-security.pdf">[slides]</a>
<li>A Brief Update from Trusted CI,
CI4MF,
January 17, 2024.
<a href="202401-basney-trustedci.pdf">[slides]</a>
<li>Trusted CI Welcome,
NSF Cybersecurity Summit,
October 24, 2023.
<a href="2023-summit-trustedci-welcome.pdf">[slides]</a>
<a href="https://youtu.be/9FeT16ppWos?si=_LxkjFKX_npPk6re">[video]</a>
<li>Ransomware,
MS-CC Cybersecurity Community of Practice,
October 10, 2023.
<a href="20231010-ms-cc-ransomware.pdf">[slides]</a>
<li>Trusted CI's TTP Program,
Trusted CI TTP Workshop,
September 14, 2023.
<a href="202309-trustedci-ttp.pdf">[slides]</a>
<li>The Trusted CI Framework for Cybersecurity Programs,
MS-CC All Hands Meeting,
August 24, 2023.
<a href="202308-trustedci-ms-cc.pdf">[slides]</a>
<a href="https://www.youtube.com/watch?v=6i8nfz4Narg">[video]</a>
<li>Migrating to Token-based Authorization: Experiences & Lessons Learned,
Throughput Computing (HTC 23),
July 11, 2023.
<a href="htc23-basney.pdf">[slides]</a>
<a href="https://youtu.be/vrUKH-JCOd0">[video]</a>
<li>Trustworthy Cyberinfrastructure,
NSF Research Infrastructure Workshop,
June 29, 2023.
<a href="20230629-trustedci-basney-riw.pdf">[slides]</a>
<a href="https://youtu.be/p9dOhznOFpI">[video]</a>
<li>A Brief Introduction to Trusted CI,
MS-CC Annual meeting,
May 11, 2023.
<a href="202305-basney-trustedci.pdf">[slides]</a>
<li>The Trusted CI Framework,
3rd High-Performance Computing Security Workshop,
March 15-16, 2023.
<a href="20230315-nist-hpc-security-trustedci.pdf">[slides]</a>
<li>CILogon,
InCommon Collaboration Success Program: Office Hours,
January 26, 2023.
<a href="202301-cilogon-basney-csp.pdf">[slides]</a>
<li>The Year Ahead in IAM: Ideas & Insights from InCommon Catalysts,
IAM Online,
January 25, 2023.
<a href="https://youtu.be/hWa7ZUE27WE">[video]</a>
<li>Research Cybersecurity Insights for 2022,
Internet2 Technology Exchange,
December 8, 2022.
<a href="20221208-basney-trustedci.pdf">[slides]</a>
<li>Panel: Making it Sticky: Offering Shared Services via InCommon Glue,
Internet2 Technology Exchange,
December 7, 2022.
<li>Panel: The InCommon Catalysts for the Community,
Internet2 Technology Exchange,
December 7, 2022.
<li>Panel: Migrating to Token-Based AuthN and AuthZ,
Internet2 Technology Exchange,
December 6, 2022.
<a href="TechEx22-Tokens-Basney.pptx">[slides]</a>
<li>FIM4ACCESS,
16th FIM4R Workshop & TAGPMA,
December 4, 2022.
<a href="202212-access-ci-iam-basney.pdf">[slides]</a>
<li>Research Cybersecurity Insights for 2022,
EDUCAUSE Conference, October 26, 2022.
<a href="202210-trusted-ci-educause.pdf">[slides]</a>
<li>Trusted CI Update,
NSF Cybersecurity Summit, October 19, 2022.
<a href="2022-trusted-ci-summit-update.pdf">[slides]</a>
<a href="https://youtu.be/psppkbRKJhQ">[video]</a>
<li>CILogon JWT Update,
NSF Cybersecurity Summit Workshop on Token-Based Authentication and Authorization,
October 18, 2022.
<a href="202210-cilogon-tokens.pdf">[slides]</a>
<a href="https://youtu.be/AiYWNHQaMKE?t=8248">[video]</a>
<li>Welcome, Trusted CI Cybersecurity Workshop at the
NSF Research Infrastructure Workshop, September 16, 2022.
<a href="202209-trusted-ci-riw-welcome.pdf">[slides]</a>
<li>CILogon AWS Update,
AWS Lunch & Learn at University of Illinois,
June 28, 2022.
<a href="202206-cilogon-aws.pdf">[slides]</a>
<li>Propelling Australia’s Digital Life Science Research with Collaborative Research Infrastructure,
TNC22, June 15, 2022.
<a href="tnc22-basney-scullen.pdf">[slides]</a>
<a href="https://tnc22.geant.org/recordings/?session=s40">[video]</a>
<li>CILogon, MAGIC Meeting, April 6, 2022.
<a href="20220406-cilogon-magic.pdf">[slides]</a>
<li>Panel: Federated Login,
<a href="https://tecc.en.computecanada.ca/">TECC</a>,
March 30, 2022.
<li>Federated Identity and Access Management,
SFSCon,
November 6, 2021.
<li>CILogon: Support for the WLCG JWT Profile and other Token Types,
2021 NSF Cybersecurity Summit Workshop on Token-Based Authentication
and Authorization
(<a href="https://sciauth.org/workshop/2021/">WoTBAn&Az 2021</a>),
October 18, 2021.
<a href="202110-cilogon-wlcg-tokens.pdf">[slides]</a>
<li>The Future of Bearer Tokens,
<a href="https://opensciencegrid.org/events/Token-Transition-Workshop/">OSG
Token Transition Workshop</a>,
October 14, 2021.
<a href="20211014-Basney-OSG-Tokens.pdf">[slides]</a>
<a href="https://youtu.be/eDHl6RNJDjA">[video]</a>
<li>SciAuth: Deploying Interoperable and Usable Authorization Tokens
to Enable Scientific Collaborations,
<a href="https://www.trustedci.org/2021-summit-program">NSF
Cybersecurity Summit</a>, October 12, 2021.
<a href="SciAuth-2021-NSF-Cybersecurity-Summit.pdf">[slides]</a>
<li>Bridging the Gap: Strategies to Enable Federated Access to
SAML-shy Resources and Services,
<a href="https://incommon.org/academy/camp-meetings/2021-camp-week/">InCommon
CAMP Week</a>,
October 5, 2021.
<li>CILogon: Enabling Federated Identity and Access Management for
Scientific Collaborations,
<a href="https://incommon.org/academy/webinars/">IAM Online</a>,
July 27, 2021.
<a href="https://youtu.be/7F-q2HRRGUE">[video]</a>
<a href="202107-cilogon-iamonline.pdf">[slides]</a>
<li>Cybersecurity Careers Panel,
<a href="https://pearc.acm.org/pearc21/student-program/pearc21-cybersecurity-careers-panel/">PEARC21
Student Program</a>,
July 18, 2021.
<a href="https://youtu.be/ReypK3Bgdts">[video]</a>
<a href="PEARC21CybersecurityCareersPanelBasney.pdf">[slides]</a>
<li>Town Hall Discussion: Authorization and Identity,
<a href="https://agenda.hep.wisc.edu/event/1579/contributions/23054/">HTCondor
Week 2021</a>, May 24, 2021.
<li>From identity-based authorization to capabilities: SciTokens,
JWTs, and
OAuth, <a href="https://indico.fnal.gov/event/47040/contributions/208457/">OSG
All-Hands Meeting 2021</a>, March 3, 2021.
<a href="20210303-Basney.pdf">[slides]</a>
<li>SciTokens: Federated Authorization for Distributed Scientific
Computing, <a href="https://trustedci.org/webinars">Trusted CI
Webinar</a>, January 25, 2021.
<a href="https://youtu.be/9bbF8FRzN7k">[video]</a>
<a href="https://hdl.handle.net/2142/109212">[slides]</a>
<li>Federated Identity, InCommon, and Enabling Federated Access to
Research Services, <a href="https://archive.njedge.net/edgecon2021/">EdgeCon
2021</a>, January 6, 2021.
<li>Trustworthy Data Panel, Trusted CI Webinar, December 7, 2020.
<a href="https://youtu.be/MuQIsL18ZRo">[video]</a>
<a href="https://hdl.handle.net/2142/109069">[slides]</a>
<li>XSEDE's Perspective on Token Assurance for Authentication and Authorization,
TAGPMA Workshop on Token-Based Authentication and Authorization
(<a href="https://indico.rnp.br/event/33/">WoTBAN&AZ 2020</a>),
December 1, 2020.
<li>LIGO's use of SciTokens,
TAGPMA Workshop on Token-Based Authentication and Authorization
(<a href="https://indico.rnp.br/event/33/">WoTBAN&AZ 2020</a>),
November 30, 2020.
<li>Guidance and Survey Results from the Trustworthy Data Working Group,
SGCI Webinar,
October 7, 2020.
<a href="https://www.slideshare.net/jbasney/guidance-and-survey-results-from-the-trustworthy-data-working-group">[slides]</a>
<a href="https://youtu.be/6huXdufHbLw">[video]</a>
<li>Update from the Trustworthy Data Working Group,
NSF Big Data Hubs Data Sharing and Cyberinfrastructure Working Group,
October 2, 2020.
<a href="https://youtu.be/Lm7Gf2ZDyyc">[video]</a>
<li>From Identity-Based Authorization to Capabilities: SciTokens,
JWTs, and OAuth,
<a href="https://indico.cern.ch/event/936993/overview">HTCondor
Workshop Autumn 2020</a>,
September 25, 2020.
<a href="https://videos.cern.ch/record/2741083">[video]</a>
<a href="20200925-Basney.pdf">[slides]</a>
<li>Community Survey Results from the Trustworthy Data Working Group,
NSF Cybersecurity Summit,
September 24, 2020.
<a href="https://youtu.be/YxFSM0N1Egw">[video]</a>
<li>Community Survey Results from the Trustworthy Data Working Group,
Fourth Workshop on Trustworthy Scientific Cyberinfrastructure
(<a href="https://www.trustedci.org/pearc20-workshop">TrustedCI@PEARC20</a>),
July 24, 2020.
<li>Federation Advanced Concepts,
<a href="https://meetings.internet2.edu/2020-basecamp/program/">InCommon BaseCAMP</a>,
July 21, 2020.
<li>Identity and Access Management in SCIMMA,
<a href="https://scimma.org/events/virtual2020">SCIMMA May 2020 Virtual Workshop</a>,
May 20, 2020.
<a href="https://youtu.be/cN1csPrMaPk">[video]</a>
<li>Trustworthy Data Working Group,
NSF Big Data Hubs Data Sharing and Cyberinfrastructure Working Group,
March 6, 2020.
<a href="https://youtu.be/6V9Lck3HUB8">[video]</a>
<li>Assurance for JWT,
<a href="https://indico.rnp.br/event/13/">28th TAGPMA Face-to-Face
Meeting</a>,
December 13, 2019.
<a href="20191213-Assurance4JWT.pdf">[slides]</a>
<li>Peer Review of REFEDS Assurance Adoption,
<a href="https://indico.rnp.br/event/13/">28th TAGPMA Face-to-Face
Meeting</a>,
December 13, 2019.
<li>Brainstorming About Container Security Scanning Tools,
<a href="https://wiki.geant.org/display/WISE/WISE+@+NSF+Cybersecurity+Summit+2019">WISE @ NSF Cybersecurity Summit</a>,
October 15, 2019.
<li>Trusted CI,
Open Storage Network Community Workshop,
October 10, 2019.
<li>Identity and Access Management,
SFSCon,
September 28, 2019.
<li>CILogon,
<a href="https://indico.cern.ch/event/834658/">mini-FIM4R at
Fermilab</a>,
September 12, 2019.
<a href="20190912-cilogon-fim4r-basney.pdf">[slides]</a>
<li>Panel: Securing your Infrastructure in a Changing Landscape: An
Engineering Perspective,
Securing Research Data Workshop,
August 22, 2019.
<li>National Research Resources: CILogon,
<a href="https://meetings.internet2.edu/2019-basecamp/">InCommon BaseCAMP</a>,
August 14, 2019.
<li>Transition to Practice Success Stories Panel,
<a href="https://trustedci.org/2019-ttp-workshop">Cybersecurity
Transition to Practice (TTP) Workshop</a>,
July 19, 2019.
<li>Panel: Federal agency support and cyberinfrastructure,
<a href="https://sites.duke.edu/cyberrisk/">CyberRISK Workshop for Minority Serving Institutions (MSIs)</a>,
July 11, 2019.
<li>CILogon:
Enabling Federated Identity and Access Management for Scientific
Collaborations,
International
Symposium on Grids & Clouds (ISGC),
April 4, 2019.
<li>CILogon,
SciTokens and Grid Community Toolkits,
IGTF
All-Hands Meeting,
April 1, 2019.
<li><a href="https://speakerdeck.com/jbasney/trusted-cis-approach-to-security-for-open-science-projects">Trusted CI's approach to security appropriate for open science
projects</a>,
<a href="https://indico.cern.ch/event/775478/">13th FIM4R Workshop: Federated Identity Management for Research Collaborations</a>,
February 11, 2019.
<li>Authorizing Access to
Science Gateway Resources,
Science Gateways Community Institute Webinar,
January 9, 2019.
<a href="https://youtu.be/d1BkIY_qf90">[video]</a>
<li><a href="https://speakerdeck.com/jbasney/identity-management-for-research-collaborations">Identity Management for Research Collaborations</a>,
MAGIC at SC18,
November 14, 2018.
<li><a href="https://meetings.internet2.edu/2018-technology-exchange/detail/10005167/">Why
Should Enterprise IdP Operators Care About Federation &
Research?</a>,
Internet2 Technology Exchange,
October 16, 2018.
<li><a href="https://meetings.internet2.edu/2018-technology-exchange/detail/10005175/">Beyond
the Wiki: Federating Applications in Support of Research</a>,
Internet2 Technology Exchange,
October 16, 2018.
<li><a href="https://speakerdeck.com/jbasney/security-and-assurance-for-researcher-i">Security and Assurance for Researcher Identities</a>,
<a href="https://trustedci.org/2018-nsf-cybersecurity-summit/">NSF Cybersecurity Summit</a>,
August 23, 2018.
<li><a href="https://hdl.handle.net/2142/100440">Cybersecurity for Gateways</a>,
SGCI Bootcamp,
August 15, 2018.
<li><a href="https://speakerdeck.com/jbasney/scitokens-capability-based-secure-access-to-remote-scientific-data">SciTokens: Capability-Based Secure Access to Remote Scientific Data</a>,
<a href="https://www.pearc18.pearc.org/">PEARC18</a>,
July 25, 2018.
<li><a href="https://speakerdeck.com/jbasney/the-scitokens-authorization-model-json-web-tokens-and-oauth">The
SciTokens Authorization Model: JSON Web Tokens & OAuth</a>,
<a href="https://agenda.hep.wisc.edu/event/1201/other-view">HTCondor Week</a>
May 22, 2018.
<li><a href="https://speakerdeck.com/jbasney/cilogon-ca-update">CILogon CA Update</a>
26th TAGPMA Face-to-Face Meeting,
May 10, 2018.
<li><a href="https://meetings.internet2.edu/2018-global-summit/detail/10004992/">Adopting AARC Guidelines</a>,
Internet2 Global Summit,
May 9 2018.
<a href="20180509-basney-xsede.pdf">[slides]</a>
<li><a href="https://meetings.internet2.edu/2018-global-summit/detail/10004991/">Cybersecurity for Research on Campus: Not Just HIPAA & FISMA</a>,
Internet2 Global Summit,
May 7, 2018.
<li><a href="https://events.educause.edu/special-topic-events/security-professionals-conference/2018/agenda/cybersecurity-for-research-on-campus-not-just-hipaa--fisma">Cybersecurity for Research on Campus: Not Just HIPAA & FISMA</a>,
EDUCAUSE Security Professionals Conference,
April 11, 2018.
<li><a href="https://indico.cern.ch/event/681873/#15-fim-needsplans-for-the-lsst">FIM needs/plans for the LSST project</a>,
12th FIM4R Workshop: Federated Identity Management for Research Collaborations,
February 5, 2018.
<a href="FIM4R_Feb_2018_LSST_FIM_Needs.pdf">[slides]</a>
<li><a href="https://indico.nikhef.nl/event/1076/">CILogon & SciTokens: OIDC/OAuth Federation</a>,
42nd EUGridPMA Prague meeting,
January 22, 2018.
<a href="CILogon__SciTokens_-_OIDC_Fed_-_EUGridPMA_20180122.pdf">[slides]</a>
<li><a href="https://www.youtube.com/watch?v=73AdwKDvPnM">CILogon 2.0: An Integrated IAM Platform for Science</a>,
IAM Online,
January 17, 2018.
<li><a href="https://www.slideshare.net/jbasney/urisc-sc17">Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure</a>,
URISC@SC17,
November 11, 2017.
<li><a href="https://www.slideshare.net/jbasney/cicipi2017">CILogon 2.0</a>,
NSF CICI PI Meeting,
October 3, 2017.
<li><a href="https://www.slideshare.net/jbasney/fim4r">FIM4R Update: US Projects</a>,
11th FIM4R Workshop,
September 19, 2017.
<li><a href="https://www.slideshare.net/jbasney/cilogon-pearc17">CILogon</a>,
PEARC,
July 12, 2017.
<li><a href="https://www.slideshare.net/jbasney/2017cilogon20i2gs">CILogon</a>,
Internet2 Global Summit,
May 5, 2017.
<li><a href="https://www.slideshare.net/jbasney/ctscswamp">CTSC and
SWAMP: cybersecurity resources for your campus</a>,
CASC Spring Meeting,
March 24, 2017.
<li><a href="https://www.slideshare.net/jbasney/cilogon-agu16">CILogon 2.0</a>,
AGU Fall Meeting,
December 14, 2016.
<li><a href="https://www.slideshare.net/jbasney/sc16">CILogon 2.0</a>,
Middleware And Grid Interagency Coordination (MAGIC) session at SC16,
November 15, 2016.
<li><a href="https://www.slideshare.net/jbasney/fedushare-techex16">FeduShare Update</a>,
Internet2 Technology Exchange,
September 28, 2016.
<li><a href="https://www.slideshare.net/jbasney/cilogontechex2016">CILogon 2.0</a>,
Internet2 Technology Exchange,
September 26, 2016.
<li><a href="https://www.slideshare.net/jbasney/2016-igtf">Trusting External Identity Providers for Global Research Collaborations - Mind the Gap!</a>,
IGTF All Hands Meeting,
September 19, 2016.
<li><a href="https://www.slideshare.net/jbasney/cybersecurity-for-conservation">Cybersecurity for Conservation</a>,
Conference on Conservation, Computation, and Criminology,
July 7, 2016.
<li><a href="https://www.slideshare.net/jbasney/ctsc-tnc16">CTSC: Securing NSF Research</a>,
TNC16,
June 15, 2016.
<li><a href="https://www.slideshare.net/jbasney/cilogon-20-at-2016-internet2-global-summit">CILogon 2.0</a>,
Internet2 Global Summit,
May 17, 2016.
<li><a href="https://www.slideshare.net/jbasney/saml-security-contacts">Security Contacts in SAML Metadata</a>,
<a href="https://www.terena.org/activities/ism/wise-ws/">WISE Workshop</a>,
October 20, 2015.
<li><a href="https://www.slideshare.net/jbasney/fedushare-techex15">FeduShare: A User Managed Collaboration Framework</a>,
<a href="https://meetings.internet2.edu/2015-technology-exchange/detail/10003961/">Internet2 Technology Exchange</a>,
October 6, 2015.
<li><a href="https://www.slideshare.net/jbasney/cilogon-20-at-refeds-30">CILogon 2.0</a>,
<a href="https://refeds.org/meetings/30th-meeting-oct-2015">REFEDS</a>,
October 4, 2015.
<li>Case Studies - InCommon Certificate Service,
<a href="https://www.incommon.org/academy/webinars/">IAM Online</a>,
July 8, 2015.
<li><a href="https://www.slideshare.net/jbasney/cilogon-globusworld2015">CILogon and InCommon: Technical Update</a>,
<a href="https://www.globusworld.org/">GlobusWorld</a>,
April 14, 2015.
<li>CILogon,
Internet2 Technology Exchange,
October 2014.
<a href="20141030-basney-cilogon.pdf">[pdf]</a>
<li>CILogon-HA: September 2014 Update,
DOE PI Meeting,
September 2014.
<a href="2014-09-cilogon-ha.pdf">[pdf]</a>
<li>Good Federation Citizenship,
<a href="https://www.incommon.org/academy/webinars/">IAM Online</a>,
May 28, 2014.
<li>CILogon,
Middleware And Grid Interagency Coordination (MAGIC) meeting,
November 20, 2013.
<a href="sc13-magic-cilogon.pdf">[pdf]</a>
<li>InCommon & CILogon: Federated Identities Supporting Science,
RedCLARA Federations Virtual Day,
Jun 19, 2013.
<a href="2013-06-basney-redclara.pdf">[pdf]</a>
<li>TAC Interfederation Subgroup Update,
<a href="https://spaces.internet2.edu/display/InCCollaborate/Virtual+Working+Groups+-+May+20-21%2C+2013">InCommon Virtual Working Groups</a>,
May 20, 2013.
<a href="201305-incinterfed.pptx">[pptx]</a>
<li>TAC Interfederation Subgroup Introduction,
<a href="https://spaces.internet2.edu/pages/viewpage.action?pageId=36701791">InCommon TAC Community Update</a>,
February 22, 2013.
<li>CILogon and OAuth for MyProxy: Federated Authentication to Globus
Online and Beyond,
<a href="https://www.globusworld.org/">GlobusWORLD</a>,
April 17, 2013.
<a href="basney-GW13.pdf">[pdf]</a>
<a href="https://www.youtube.com/watch?v=QCca-VsY_18">[video]</a>
<li>CILogon-HA: Higher Assurance Federated Identities for DOE Science,
<a href="https://indico.bnl.gov/conferenceDisplay.py?confId=566">DOE
NGNS PI Meeting</a>,
March 19, 2013.
<a href="2013-03-cilogon-ha.pdf">[pdf]</a>
<li>CILogon and Social Identities,
<a href="https://www.incommon.org/academy/webinars/">IAM Online</a>,
December 12, 2012.
<a href="20121212-cilogon.pdf">[pdf]</a>
<li>
CILogon,
Middleware And Grid Interagency Coordination (MAGIC) meeting,
November 14, 2012.
<a href="sc12-magic-cilogon-basney.pdf">[pdf]</a>
<li>
<a href="https://www.xsede.org/web/xsede12">XSEDE12</a> Panel:
Security for Science Gateways and Campus Bridging,
July 18, 2012.
<a href="https://doi.org/10.1145/2335755.2335863">https://doi.org/10.1145/2335755.2335863</a>
<a href="xsede12security4gateways+bridging.pptx">[pptx]</a>
<li>CILogon: Federated Access to US CyberInfrastructure,
<a href="https://tnc2012.terena.org/">TERENA Networking Conference</a>,
May 22 2012.
<a href="201205-cilogon-tnc.pdf">[pdf]</a>
<li>Distributed Web Security for Science Gateways,
XSEDE Gateways Call,
Feburary 17, 2012.
<a href="20120217-basney-gateways.pdf">[pdf]</a>
<li>Distributed Web Security for Science Gateways,
IU CACR Security Seminar,
February 2, 2012.
<a href="201202-cacr-basney.pdf">[pdf]</a>
<li>Federated Identity for Scientific Collaborations: Policy Issues,
<a href="https://indico.cern.ch/conferenceDisplay.py?confId=157486">2nd Workshop on Federated Identity Systems for Scientific Collaborations</a>,
November 2-3, 2011.
<a href="201111-fedidm-basney.pptx">[pptx]</a>
<a href="201111-fedidm-basney.pdf">[pdf]</a>
<li>CILogon: Federating Identities for Researchers,
<a href="https://meetings.internet2.edu/2011-fall-mm/">Internet2 Member Meeting</a>,
October 6, 2011.
<a href="20111006-basney-cilogon.pdf">[pdf]</a>
<li>CILogon: Network Roaming with Certificates,
<a href="https://meetings.internet2.edu/2011-fall-mm/">Internet2 Member Meeting</a>,
October 3, 2011.
<a href="20111003-basney-cilogon.pdf">[pdf]</a>
<li>CILogon, OAuth, and Science Gateway Security,
CyberGIS Conference Call,
September 15, 2011.
<a href="20110915-cybergis.pptx">[pptx]</a>
<a href="20110915-cybergis.pdf">[pdf]</a>
<li>InCommon Federation Experiences: CILogon,
InCommon CAMP,