<script src="https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d/group/411048e7-0d47-3d3c-90c2-fad3d2bd6235?jsonp=1"></script>
<?php
$contents = file_get_contents("https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d/group/411048e7-0d47-3d3c-90c2-fad3d2bd6235");
print_r($contents);
?>
<iframe src="https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d/group/411048e7-0d47-3d3c-90c2-fad3d2bd6235"></iframe>
For more details see the documention.
To the site owner:
Action required! Mendeley is changing its API. In order to keep using Mendeley with BibBase past April 14th, you need to:
@techreport{ title = {Data Integrity Threat Model}, type = {techreport}, year = {2019}, keywords = {Data Integrity,Non,OSCRP,Threat Model,malicious threat model}, pages = {9}, websites = {http://hdl.handle.net/2022/23225}, month = {6}, day = {27}, city = {Bloomington, IN}, institution = {ScholarWorks}, id = {c8638e62-4bb9-3e6f-8f5d-5e481ea314df}, created = {2019-08-20T15:36:00.208Z}, accessed = {2019-08-20}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-08-21T17:03:38.146Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {This document uses OSCRP as a point of reference to construct a non-malicious Data Integrity Threat Model as a part of IRIS project. The goal of the project is to detect the source of unintentional integrity errors in the scientific workflow executions on distributed cyberinfrastructure.}, bibtype = {techreport}, author = {Welch, Von and Abhinit, Ishan} }
@techreport{ title = {The Pervasive Technology Institute at 20: Two decades of success and counting}, type = {techreport}, year = {2019}, websites = {http://hdl.handle.net/2022/22607}, city = {Bloomington, IN}, institution = {Pervasive Technology Institute}, id = {a51a01ba-5825-389f-882f-8c4c19b3bf07}, created = {2019-08-20T15:53:42.310Z}, accessed = {2019-08-20}, file_attached = {true}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-10-01T17:56:37.204Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, bibtype = {techreport}, author = {Stewart, Craig A.; and Welch, Von; and Doak, Thomas G.; and Miller, Therese; and Plale, Beth; and Walsh, John A.; and Link, Matthew R.; and Snapp-Childs, Winona}, doi = {10.5967/QDF0-S837} }
@techreport{ title = {A Guide for Software Assurance for SWIP}, type = {techreport}, year = {2019}, pages = {1-37}, websites = {https://pegasus.isi.edu/,http://hdl.handle.net/2022/23413}, id = {8ce363e9-0cfa-360c-b145-86c6d34b0c4a}, created = {2019-09-04T20:41:30.988Z}, file_attached = {true}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-04T20:41:31.071Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {The Scientific Workflow Integrity with Pegasus (SWIP) project adds data integrity checking to the Pegasus workflow management system (https://pegasus.isi.edu/). As part of SWIP, we performed software assurance (SwA) on the Pegasus software using the Software Assurance Marketplace (SWAMP, https://www.mir-swamp.org/). Initially, we planned to perform SwA only on the parts of the code base related to SWIP, i.e., only the code related to the data integrity checks. However, during the course of the SWIP project, a decision was made to perform SwA on the entire Pegasus code base. In addition, the project took on a research effort of trying to quantify differences in SwA results between Pegasus versions. We summarize our SwA process and results here. SwA results provide insight, but they are still subjective; developers of the software being assessed (Pegasus in this project) need to determine how those results need to be addressed.}, bibtype = {techreport}, author = {Heiland, Randy; and Rynge, Mats; and Vahi, Karan; and Deelman, Ewa; and Welch, Von} }
@inproceedings{ title = {Trusted CI Experiences in Cybersecurity and Service to Open Science}, type = {inproceedings}, year = {2019}, pages = {1-8}, publisher = {Association for Computing Machinery (ACM)}, id = {06cc0289-4cb7-386e-875b-5ce2b61881d9}, created = {2019-09-11T16:00:39.271Z}, accessed = {2019-09-11}, file_attached = {true}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-11T16:00:39.345Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation (NSF) to serve the community as the NSF Cybersecurity Center of Excellence (CCoE). Trusted CI is an effort to address cybersecurity for the open science community through a single organization that provides leadership, training, consulting, and knowledge to that community. The article describes the experiences and lessons learned of Trusted CI regarding both cybersecurity for open science and managing the process of providing centralized services to a broad and diverse community.}, bibtype = {inproceedings}, author = {Adams, Andrew and Jackson, Craig and Kiser, Ryan and Krenz, Mark and Marsteller, Jim and Miller, Barton P. and Peisert, Sean and Russell, Scott and Sons, Susan and Welch, Von and Zage, John and Avila, Kay and Basney, Jim and Brunson, Dana and Cowles, Robert and Dopheide, Jeannette and Fleury, Terry and Heymann, Elisa and Hudson, Florence}, doi = {10.1145/3332186.3340601}, booktitle = {Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) (PEARC '19)} }
@inproceedings{ title = {Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences}, type = {inproceedings}, year = {2019}, pages = {1-8}, publisher = {Association for Computing Machinery (ACM)}, id = {221e2cfc-bb7e-3db8-bbfc-f23fb0058b83}, created = {2019-09-11T16:02:21.529Z}, accessed = {2019-09-11}, file_attached = {true}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-12T14:53:04.063Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {With the continued rise of scientific computing and the enormous increases in the size of data being processed, scientists must consider whether the processes for transmitting and storing data sufficiently assure the integrity of the scientific data. When integrity is not preserved, computations can fail and result in increased computational cost due to reruns, or worse, results can be corrupted in a manner not apparent to the scientist and produce invalid science results. Technologies such as TCP checksums, encrypted transfers, checksum validation, RAID and erasure coding provide integrity assurances at different levels, but they may not scale to large data sizes and may not cover a workflow from end-to-end, leaving gaps in which data corruption can occur undetected. In this paper we explore an approach of assuring data integrity - considering either malicious or accidental corruption - for workflow executions orchestrated by the Pegasus Workflow Management System. To validate our approach, we introduce Chaos Jungle - a toolkit providing an environment for validating integrity verification mechanisms by allowing researchers to introduce a variety of integrity errors during data transfers and storage. In addition to controlled experiments with Chaos Jungle, we provide analysis of integrity errors that we encountered when running production workflows.}, bibtype = {inproceedings}, author = {Rynge, Mats and Poehlman, William L. and Feltus, F. Alex and Vahi, Karan and Deelman, Ewa and Mandal, Anirban and Baldin, Ilya and Bhide, Omkar and Heiland, Randy and Welch, Von and Hill, Raquel}, doi = {10.1145/3332186.3332222}, booktitle = {Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) (PEARC '19)} }
@inproceedings{ title = {Initial Thoughts on Cybersecurity And Reproducibility}, type = {inproceedings}, year = {2019}, pages = {13-15}, publisher = {Association for Computing Machinery (ACM)}, id = {2f76dbc3-b76e-3785-b8cc-9b880f76d6d5}, created = {2019-09-11T16:05:13.387Z}, accessed = {2019-09-11}, file_attached = {true}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-11T16:05:13.456Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {Cybersecurity, which serves to protect computer systems and data from malicious and accidental abuse and changes, both supports and challenges the reproducibility of computational science. This position paper explores a research agenda by enumerating a set of two types of challenges that emerge at the intersection of cybersecurity and reproducibility: challenges that cybersecurity has in supporting the reproducibility of computational science, and challenges cybersecurity creates for reproducibility of computational science.}, bibtype = {inproceedings}, author = {Deelman, Ewa and Stodden, Victoria and Taufer, Michela and Welch, Von}, doi = {10.1145/3322790.3330593}, booktitle = {Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems (P-RECS '19)} }
@inproceedings{ title = {Applicability Study of the PRIMAD Model to LIGO Gravitational Wave Search Workflows}, type = {inproceedings}, year = {2019}, pages = {1-6}, websites = {http://dl.acm.org/citation.cfm?doid=3322790.3330591}, publisher = {ACM Press}, city = {New York, New York, USA}, id = {5c88d52d-7956-3e10-8529-d1f22d6c13f6}, created = {2019-09-11T16:06:47.021Z}, accessed = {2019-09-11}, file_attached = {true}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-12T18:48:09.360Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {The PRIMAD model with its six components (i.e., Platform, Research Objective, Implementation, Methods, Actors, and Data), provides an abstract taxonomy to represent computational experiments and enforce reproducibility by design. In this paper, we assess the model applicability to a set of Laser Interferometer Gravitational-Wave Observatory (LIGO) workflows from literature sources (i.e., published papers). Our work outlines potentials and limits of the model in terms of its abstraction levels and application process.}, bibtype = {inproceedings}, author = {Chapp, Dylan and Rorabaugh, Danny and Brown, Duncan A. and Deelman, Ewa and Vahi, Karan and Welch, Von and Taufer, Michela}, doi = {10.1145/3322790.3330591}, booktitle = {Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems - P-RECS '19} }
@techreport{ title = {Trusted CI Annual Report for 2018}, type = {techreport}, year = {2018}, websites = {hp://hdl.handle.net/2022/22597}, id = {ca32dbd5-e330-3511-9ac2-c98a171b7c11}, created = {2019-09-04T20:48:17.611Z}, file_attached = {true}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-10T15:24:01.201Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, bibtype = {techreport}, author = {Adams, Andrew and Avila, Kay and Atkins, Joel and Basney, Jim and Bohland, Leslee and Borecky, Diana and Cowles, Robert and Dopheide, Jeannee and Fleury, Terry and Harbour, Grayson and Heymann, Elisa and Hudson, Florence and Jackson, Craig and Kiser, Ryan and Krenz, Mark and Marsteller, Jim and Miller, Barton and Raquel, Warren and Ruff, Preston and Russell, Scoo and Shah, Zalak and Shankar, Anurag and Sons, Susan and Welch, Von and Zage, John} }
@techreport{ title = {The Report of the 2018 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure}, type = {techreport}, year = {2018}, websites = {http://hdl.handle.net/2022/22588.}, id = {03d3ae36-087f-3de4-91c9-7a17808f8edd}, created = {2019-09-10T15:24:00.435Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-10T15:24:00.435Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, bibtype = {techreport}, author = {Andrew Adams, Jeannette Dopheide, Mark Krenz, James Marsteller, Von Welch and and John Zage, undefined} }
@article{ title = {The Rise of Cybersecurity and Its Impact on Data Protection}, type = {article}, year = {2017}, pages = {73-75}, volume = {7}, id = {7f32ce95-c147-390d-98f6-7801fba0b9e4}, created = {2018-02-27T18:07:36.673Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:36.673Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Svantesson, Dan Jerker B and Lynskey, Orla and Millard, Christopher}, doi = {https://doi.org/10.1093/idpl/ipw022}, journal = {International Data Privacy Law}, number = {2} }
@techreport{ title = {Pervasive Technology Institute Annual Report: Research Innovations and Advanced Cyberinfrastructure Services in Support of IU Strategic Goals During FY 2017}, type = {techreport}, year = {2017}, websites = {http://hdl.handle.net/2022/21809}, id = {26883fb6-be7d-39f2-ba49-db71de80bdb9}, created = {2018-02-27T18:07:36.723Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2020-09-10T00:01:47.048Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Stewart, Craig and Plale, Beth and Welch, Von and Pierce, Marlon and Fox, Geoffrey Charles and Doak, Thomas G and Hancock, David Y and Henschel, Robert and Link, Matthew R and Miller, Therese} }
@article{ title = {The medical science DMZ: a network design pattern for data-intensive medical science}, type = {article}, year = {2017}, id = {8aa4b240-261f-31ef-af4f-6e2820fa95dd}, created = {2018-02-27T18:07:36.936Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:36.936Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Peisert, Sean and Dart, Eli and Barnett, William and Balas, Edward and Cuff, James and Grossman, Robert L and Berman, Ari and Shankar, Anurag and Tierney, Brian}, journal = {Journal of the American Medical Informatics Association} }
@book{ title = {Bulk Collection: Systematic Government Access to Private-Sector Data}, type = {book}, year = {2017}, publisher = {Oxford University Press}, id = {56f8a9a2-65d7-3077-856f-d8ef0328babe}, created = {2018-02-27T18:07:36.942Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:36.942Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {BOOK}, private_publication = {false}, bibtype = {book}, author = {Cate, Fred H and Dempsey, James X} }
@article{ title = {The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity}, type = {article}, year = {2017}, keywords = {Cyber security; Cyber-attacks; OSCRP; Risk profil,Natural sciences computing; Security of data,Security systems}, pages = {94-95}, volume = {15}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031689244&doi=10.1109%2FMSP.2017.3681058&partnerID=40&md5=c8539146c103a7d978d47ba1947849a6}, publisher = {Institute of Electrical and Electronics Engineers Inc.}, id = {878e88ba-12a0-3beb-b90f-6115f81c7538}, created = {2018-02-27T18:07:37.619Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.619Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Peisert201794}, source_type = {article}, notes = {cited By 0}, private_publication = {false}, abstract = {The Open Science Cyber Risk Profile (OSCRP) working group has created a document that motivates scientists by demonstrating how improving their security posture reduces the risks to their science. This effort aims to bridge the communication gap between scientists and IT security professionals and allows for the effective management of risks to open science caused by IT security threats. © 2003-2012 IEEE.}, bibtype = {article}, author = {Peisert, S and Welch, V}, doi = {10.1109/MSP.2017.3681058}, journal = {IEEE Security and Privacy}, number = {5} }
@techreport{ title = {Indiana University Pervasive Technology Institute}, type = {techreport}, year = {2017}, city = {Bloomington, IN}, id = {98c63812-3b4e-302d-8d1a-024af71234b6}, created = {2018-02-27T18:07:38.292Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-07-12T19:57:14.607Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {false}, hidden = {false}, source_type = {misc}, private_publication = {false}, bibtype = {techreport}, author = {Stewart, C A and Welch, V and Plale, B and Fox, Geoffrey Charles and Pierce, M and Sterling, T}, doi = {10.5072/FK2154N14D} }
@article{ title = {Machine Learning with Personal Data: Is Data Protection Law Smart Enough to Meet the Challenge?}, type = {article}, year = {2017}, pages = {1-2}, volume = {7}, id = {9b20e05f-5d31-31f4-a8fd-7c5f3d8fb7bc}, created = {2018-02-27T18:07:40.176Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-08-21T17:43:54.792Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Svantesson, Dan Jerker B and Lynskey, Orla and Millard, Christopher}, doi = {10.1093/idpl/ipx003}, journal = {International Data Privacy Law}, number = {1} }
@inproceedings{ title = {Modeling the Past and Future of Identity Management for Scientific Collaborations}, type = {inproceedings}, year = {2016}, id = {546d26d6-48e4-3555-9d58-09254fc564f7}, created = {2018-02-27T18:07:37.213Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.213Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Cowles, Robert and Jackson, Craig and Welch, Von}, booktitle = {Proceedings of the International Symposium on Grids and Clouds (ISGC) 2016. 13-18 March 2016. Academia Sinica, Taipei, Taiwan. Online at http://pos. sissa. it/cgi-bin/reader/conf. cgi? confid= 270, id. 14} }
@article{ title = {A Time of Turmoil}, type = {article}, year = {2016}, pages = {1-3}, volume = {6}, id = {4ecb10e1-bae2-3a16-a93c-6a2c5eb236eb}, created = {2018-02-27T18:07:37.448Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.448Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Svantesson, Dan Jerker B and Lynsky, Orla and Millard, Christopher}, doi = {https://doi.org/10.1093/idpl/ipw001}, journal = {International Data Privacy Law}, number = {1} }
@techreport{ title = {SciGaP-CTSC Engagement Summary}, type = {techreport}, year = {2016}, id = {14f61214-8035-39ce-9022-b5b1a257379b}, created = {2018-02-27T18:07:37.490Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.490Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Heiland, Randy and Koranda, Scott and Welch, Von} }
@article{ title = {The Language of Data Privacy Law (and How It Differs from Reality)}, type = {article}, year = {2016}, pages = {259-269}, volume = {4}, id = {307e1cb4-69db-31e8-b56c-3ec1b2e5b24d}, created = {2018-02-27T18:07:37.759Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.759Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Svantesson, Dan Jerker B and Lynskey, Orla and Millard, Christopher}, journal = {International Data Privacy Law}, number = {1} }
@techreport{ title = {Center for Trustworthy Scientific Cyberinfrastructure-The NSF Cybersecurity Center of Excellence: Year One Report}, type = {techreport}, year = {2016}, publisher = {CTSC}, id = {1d70ac86-b79a-3916-a400-44673438e74a}, created = {2018-02-27T18:07:38.326Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.326Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Welch, Von} }
@techreport{ title = {PKI-ASAF Design Documents}, type = {techreport}, year = {2016}, id = {2e4fadcf-2500-3f8c-bb3f-ae3de0a81cf4}, created = {2018-02-27T18:07:38.848Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.848Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Welch, Von and Heiland, Randy and Garrison III, William C and Lee, Adam J} }
@article{ title = {The Global Data Protection Implications of" Brexit"}, type = {article}, year = {2016}, pages = {167-169}, volume = {6}, id = {d38628ec-8ce5-32ab-8e0c-35ba3f434b60}, created = {2018-02-27T18:07:39.104Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.104Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Svantesson, Dan Jerker B and Lynskey, Orla and Millard, Christopher}, journal = {International Data Privacy Law}, number = {3} }
@techreport{ title = {The Report of the 2016 Cybersecurity Summit for Large Facilities and Cyberinfrastructure: Strengthening Trustworthy Science}, type = {techreport}, year = {2016}, id = {82502998-b85d-35b2-b689-1616c2771496}, created = {2018-02-27T18:07:39.440Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.440Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Marsteller, James and Welch, Von and Starzynski Coddens, Amy} }
@article{ title = {The Medical Science DMZ}, type = {article}, year = {2016}, pages = {1199-1201}, volume = {23}, publisher = {Oxford University Press}, id = {79676e3f-cb36-336e-9e85-fb2b1e627eee}, created = {2018-02-27T18:07:39.874Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.874Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Peisert, Sean and Barnett, William and Dart, Eli and Cuff, James and Grossman, Robert L and Balas, Edward and Berman, Ari and Shankar, Anurag and Tierney, Brian}, journal = {Journal of the American Medical Informatics Association}, number = {6} }
@article{ title = {Protecting Privacy in Big Data}, type = {article}, year = {2015}, pages = {7-20}, volume = {8}, id = {e05f6016-85e8-327f-bfb9-581a181742e1}, created = {2018-02-27T18:07:37.490Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-08-29T18:55:44.060Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H}, journal = {Journal of Law and Economic Regulation}, number = {1} }
@inproceedings{ title = {Authentication and Authorization Considerations for a Multi-tenant Service}, type = {inproceedings}, year = {2015}, pages = {29-35}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962377238&doi=10.1145%2F2753524.2753534&partnerID=40&md5=06c617703f402a57e3922f8a290ed55d,http://dl.acm.org/citation.cfm?doid=2753524.2753534}, publisher = {ACM Press}, city = {New York, New York, USA}, id = {440344ae-355f-385c-9276-afff5e9d7657}, created = {2018-02-27T18:07:38.053Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-12T14:53:04.052Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Heiland201529}, source_type = {conference}, notes = {cited By 3; Conference of 1st Workshop on the Science of Cyberinfrastructure: Research, Experience, Applications and Models, SCREAM 2015 ; Conference Date: 16 June 2015; Conference Code:116136}, private_publication = {false}, abstract = {Distributed cyberinfrastructure requires users (and machines) to perform some sort of authentication and authorization (together simply known as auth). In the early days of computing, authentication was performed with just a username and password combination, and this is still prevalent today. But during the past several years, we have seen an evolution of approaches and protocols for auth: Kerberos, SSH keys, X.509, OpenID, API keys, OAuth, and more. Not surprisingly, there are trade-offs, both technical and social, for each approach. The NSF Science Gateway communities have had to deal with a variety of auth issues. However, most of the early gateways were rather restrictive in their model of access and development. The practice of using community credentials (certificates), a well-intentioned idea to alleviate restrictive access, still posed a barrier to researchers and challenges for security and auditing. And while the web portal-based gateway clients offered users easy access from a browser, both the interface and the back-end functionality were constrained in the flexibility and extensibility they could provide. Designing a well-defined application programming interface (API) to fine-grained, generic gateway services (on secure, hosted cyberinfrastructure), together with an auth approach that has a lower barrier to entry, will hopefully present a more welcoming environment for both users and developers. This paper provides a review and some thoughts on these topics, with a focus on the role of auth between a Science Gateway and a service provider.}, bibtype = {inproceedings}, author = {Heiland, Randy and Koranda, Scott and Marru, Suresh and Pierce, Marlon and Welch, Von}, doi = {10.1145/2753524.2753534}, booktitle = {Proceedings of the 1st Workshop on The Science of Cyberinfrastructure Research, Experience, Applications and Models - SCREAM '15} }
@inproceedings{ title = {Facilitating Scientific Collaborations by Delegating Identity Management}, type = {inproceedings}, year = {2015}, keywords = {Access control,Cyber security,Delegation,Identity,Identity ma,Risk management}, pages = {15-19}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979747691&doi=10.1145%2F2752499.2752501&partnerID=40&md5=83a416d313602ca3c75ba6528f549833,http://dl.acm.org/citation.cfm?doid=2752499.2752501}, publisher = {ACM Press}, city = {New York, New York, USA}, id = {d2b2b747-4e84-3cb4-af3a-78806e336d6b}, created = {2018-02-27T18:07:38.384Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2020-04-21T22:46:21.078Z}, read = {true}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Cowles201515}, source_type = {conference}, notes = {cited By 0; Conference of 2nd Workshop on Changing Landscapes in HPC Security, CLHS 2015 ; Conference Date: 16 June 2015; Conference Code:122511}, private_publication = {false}, abstract = {DOE Labs are often presented with conflicting requirements for providing services to scientific collaboratories. An identity management model involving transitive trust is increasingly common. We show how existing policies allow for increased delegation of identity management within an acceptable risk management framework. Specific topics addressed include deemed exports, DOE orders, Inertia and Risk, Traceability, and Technology Limitations. Real life examples of an incremental approach to implementing transitive trust are presented.}, bibtype = {inproceedings}, author = {Cowles, Robert and Jackson, Craig and Welch, Von}, doi = {10.1145/2752499.2752501}, booktitle = {Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security - CLHS '15} }
@article{ title = {Internet Balkanization Gathers Pace: Is Privacy the Real Driver?}, type = {article}, year = {2015}, pages = {1-2}, volume = {5}, id = {8d936710-adbf-3928-bee3-360d6f9e90dc}, created = {2018-02-27T18:07:39.174Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.174Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B and Lynskey, Orla}, doi = {https://doi.org/10.1093/idpl/ipu032}, journal = {International Data Privacy Law}, number = {1} }
@article{ title = {Risk Management in Data Protection}, type = {article}, year = {2015}, pages = {95-98}, volume = {5}, id = {05341661-7af8-3344-b7c1-de254d5fef83}, created = {2018-02-27T18:07:39.400Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.400Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B and Lynskey, Orla}, doi = {https://doi.org/10.1093/idpl/ipv005}, journal = {International Data Privacy Law}, number = {2} }
@techreport{ title = {Center for Applied Cybersecurity Research: 2015 Annual Report and Strategic Plan (2015-2020)}, type = {techreport}, year = {2015}, id = {4a5934d8-992d-3520-a4b4-0e27e67b4d02}, created = {2018-02-27T18:07:39.618Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.618Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Delaney, David G and Welch, Von and Starzynski Coddens, Amy} }
@article{ title = {The Data Protection Credibility Crisis}, type = {article}, year = {2015}, pages = {3}, volume = {5}, id = {26e83257-ceb2-38b2-a081-0b463bb62eb2}, created = {2018-02-27T18:07:40.268Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:40.268Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B and Lynskey, Orla}, journal = {International Data Privacy Law} }
@techreport{ title = {XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations}, type = {techreport}, year = {2015}, websites = {http://hdl.handle.net/2022/20399}, month = {9}, city = {Bloomington, IN}, institution = {Indiana University}, id = {3d83beb3-bda5-3961-8a06-058a61a604cb}, created = {2018-02-27T18:07:41.889Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:41.889Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {techreport}, notes = {From Duplicate 2 (XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations - Cowles, R; Jackson, C; Welch, V)<br/><br/>US Dept of Energy Next-Generation Networks for Science (NGNS) program Grant No. DE-FG02-12ER26111}, private_publication = {false}, bibtype = {techreport}, author = {Cowles, R and Jackson, C and Welch, V} }
@inproceedings{ title = {Sustained software for cyberinfrastructure - Analyses of successful efforts with a focus on NSF-funded software}, type = {inproceedings}, year = {2015}, id = {2ef3fe8c-9dd6-3aed-8dbe-49ae96ec88fd}, created = {2019-09-11T16:12:55.736Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-11T16:12:55.805Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {Reliable software that provides needed functionality is clearly essential for an effective distributed cyberinfrastructure (CI) that supports comprehensive, balanced, and flexible distributed CI. Effective distributed cyberinfrastructure, in turn, supports science and engineering applications. The purpose of this study was to understand what factors lead to software projects being well sustained over the long run, focusing on software created with funding from the US National Science Foundation (NSF) and/or used by researchers funded by the NSF. We surveyed NSF-funded researchers and performed in-depth studies of software projects that have been sustained over many years. Successful projects generally used open-source software licenses and employed good software engineering practices and test practices. However, many projects that have not been well sustained over time also met these criteria. The features that stood out about successful projects included deeply committed leadership and some sort of user forum or conference at least annually. In some cases, software project leaders have employed multiple financial strategies over the course of a decades-old software project. Such well-sustained software is used in major distributed CI projects that support thousands of users, and this software is critical to the operation of major distributed CI facilities in the US. The findings of our study identify some characteristics of software that is relevant to the NSF-supported research community, and that has been sustained over many years.}, bibtype = {inproceedings}, author = {Stewart, C.A. and Barnett, W.K. and Wernert, E.A. and Wernert, J.A. and Welch, V. and Knepper, R.}, doi = {10.1145/2753524.2753533}, booktitle = {SCREAM 2015 - Proceedings of the 2015 Workshop on the Science of Cyberinfrastructure: Research, Experience, Applications and Models, Part of HPDC 2015} }
@inproceedings{ title = {Cyberinfrastructure resources enabling creation of the loblolly pine reference transcriptome}, type = {inproceedings}, year = {2015}, pages = {1-6}, volume = {2015-July}, websites = {http://hdl.handle.net/2022/20488,http://dl.acm.org/citation.cfm?doid=2792745.2792748}, month = {7}, publisher = {ACM Press}, city = {New York, New York, USA}, id = {0688b56e-26c8-3818-ad94-7e6805d89616}, created = {2019-09-12T18:48:07.684Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-12T18:48:07.684Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Wu2015}, source_type = {inproceedings}, private_publication = {false}, abstract = {Today's genomics technologies generate more sequence data than ever before possible, and at substantially lower costs, serving researchers across biological disciplines in transformative ways. Building transcriptome assemblies from RNA sequencing reads is one application of next-generation sequencing (NGS) that has held a central role in biological discovery in both model and non-model organisms, with and without whole genome sequence references. A major limitation in effective building of transcriptome references is no longer the sequencing data generation itself, but the computing infrastructure and expertise needed to assemble, analyze and manage the data. Here we describe a currently available resource dedicated to achieving such goals, and its use for extensive RNA assembly of up to 1.3 billion reads representing the massive transcriptome of loblolly pine, using four major assembly software installations. The Mason cluster, an XSEDE second tier resource at Indiana University, provides the necessary fast CPU cycles, large memory, and high I/O throughput for conducting large-scale genomics research. The National Center for Genome Analysis Support, or NCGAS, provides technical support in using HPC systems, bioinformatic support for determining the appropriate method to analyze a given dataset, and practical assistance in running computations. We demonstrate that a sufficient supercomputing resource and good workflow design are elements that are essential to large eukaryotic genomics and transcriptomics projects such as the complex transcriptome of loblolly pine, gene expression data that inform annotation and functional interpretation of the largest genome sequence reference to date.}, bibtype = {inproceedings}, author = {Wu, Le-Shin and Ganote, Carrie L. and Doak, Thomas G and Barnett, William and Mockaitis, Keithanne and Stewart, Craig A}, doi = {10.1145/2792745.2792748}, booktitle = {Proceedings of the 2015 XSEDE Conference on Scientific Advancements Enabled by Enhanced Cyberinfrastructure - XSEDE '15} }
@techreport{ title = {Pervasive Technology Institute annual report: Research innovations and advanced cyberinfrastructure services in support of IU strategic goals during FY 2015}, type = {techreport}, year = {2015}, keywords = {CACR,D2I,DSC,NCGAS,PTI,RT,Technical Report,advanced cyberinfrastructure,engagement,outreach,research,storage,students}, websites = {http://hdl.handle.net/2022/20566}, id = {08dd83a8-0065-342a-9423-c5e9182977c6}, created = {2020-09-10T14:25:38.392Z}, accessed = {2020-09-10}, file_attached = {true}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2020-09-10T16:51:14.243Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, bibtype = {techreport}, author = {Stewart, Craig A.; Plale, Beth; Welch, Von; Link, Matthew R.; Miller, Therese; Wernert, Eric A.; Boyles, Michael J.; Fulton, Ben; Hancock, David Y.; Henschel, Robert; Michael, Scott A.; Pierce, Marlon; Ping, Robert J.; Gniady, Tassie; Fox, Geoffrey C.; Mi, Gary;} }
@techreport{ title = {Indiana University’s advanced cyberinfrastructure in service of IU strategic goals: Activities of the Research Technologies Division of UITS and National Center for Genome Analysis Support – two Pervasive Technology Institute cyberinfrastructure and servi}, type = {techreport}, year = {2015}, keywords = {ABITC,Clinical Affairs Schools,IUSM,NCGAS,PTI,advanced cyberinfrastructure,digital collections,engagement,health sciences,research,storage,students}, websites = {https://scholarworks.iu.edu/dspace/handle/2022/19805}, publisher = {Indiana University}, id = {394b786d-01f5-3231-92eb-15eb0eecf87b}, created = {2020-09-10T17:46:56.424Z}, accessed = {2020-09-10}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2020-09-10T17:46:56.424Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, bibtype = {techreport}, author = {Stewart, Craig A.; and Plale, Beth; and Welch, Von; and Fox, Geoffrey C.; and Link, Matthew R.; and Miller, Therese; and Wernert, Eric A.; and Boyles, Michael J.; and Fulton, Ben; and Hancock, David Y.; Henschel, Robert; and Michael, Scott A.; and Pierce, Marlon; and Ping, Robert J.; and Miksik, Gary; and Gniady, Tassie;} }
@techreport{ title = {Sustainability of cyberinfrastructure software: Community needs, case studies, and success strategies}, type = {techreport}, year = {2014}, id = {43fdf4ba-c1b6-37ce-9d09-e6884c11f727}, created = {2018-02-27T18:07:37.467Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.467Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Stewart, Craig A and Barnett, William K and Wernert, Eric A and Wernert, Julie A and Welch, Von and Knepper, Richard} }
@article{ title = {Taking Stock After Four Years}, type = {article}, year = {2014}, volume = {4}, id = {75dde69b-0709-31fe-a9d0-108f712e4e33}, created = {2018-02-27T18:07:37.796Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.796Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, doi = {https://doi.org/10.1093/idpl/ipu009}, journal = {International Data Privacy Law}, number = {2} }
@inproceedings{ title = {The Case for an Open and Evolving Software Assurance Framework}, type = {inproceedings}, year = {2014}, pages = {1}, publisher = {The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)}, id = {29a9eeb6-1706-3d3b-8716-5f33ef91170e}, created = {2018-02-27T18:07:37.868Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.868Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Livny, Miron and Miller, Barton P and Welch, Von}, booktitle = {Proceedings of the International Conference on Software Engineering Research and Practice (SERP)} }
@techreport{ title = {Report of the 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure Large Facility Cybersecurity Challenges and Responses August 26‐August 28}, type = {techreport}, year = {2014}, id = {58f8f1dd-d9ce-34ba-bafd-ddb4b228e32d}, created = {2018-02-27T18:07:37.883Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.883Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {techreport}, author = {Jackson, Craig and Marsteller, James and Welch, Von} }
@techreport{ title = {Globus Data Sharing: Security Assessment}, type = {techreport}, year = {2014}, id = {9c769475-7b9f-38ea-9d8f-e10995129a24}, created = {2018-02-27T18:07:38.334Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.334Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Heiland, Randy and Koranda, Scott and Welch, Von} }
@article{ title = {When Two Worlds Collide: The Interface Between Competition Law and Data Protection}, type = {article}, year = {2014}, pages = {247-248}, volume = {4}, id = {f35478df-c36a-3db1-82cb-11235cfcd6d9}, created = {2018-02-27T18:07:38.613Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.613Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B and Lynskey, Orla}, journal = {International Data Privacy Law}, number = {4} }
@article{ title = {The role of the collaboratory in enabling large-scale identity management for HEP}, type = {article}, year = {2014}, keywords = {Collaboratories; Identity management; Motivation,Computation theory; High energy physics,Nuclear physics}, volume = {513}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84903481864&doi=10.1088%2F1742-6596%2F513%2F3%2F032022&partnerID=40&md5=87f93e27f62020498a4aa38580a3bb50}, publisher = {Institute of Physics Publishing}, city = {Amsterdam}, id = {2c4b3252-397b-3486-8f63-1f2ebd9be120}, created = {2018-02-27T18:07:38.672Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.672Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Cowles2014}, source_type = {article}, notes = {cited By 0; Conference of 20th International Conference on Computing in High Energy and Nuclear Physics, CHEP 2013 ; Conference Date: 14 October 2013 Through 18 October 2013; Conference Code:108171}, private_publication = {false}, abstract = {The authors are defining a model that describes and guides existing and future scientific collaboratory identity management implementations. Our ultimate goal is to provide guidance to virtual organizations and resource providers in designing an identity management implementation. Our model is captured in previously published work. Here, we substantially extend our analysis in terms of six motivation factors (user isolation, persistence of user data, complexity of virtual organization roles, cultural and historical inertia, scaling, and incentive for collaboration), observed in interviews with community members involved in identity management, that impact implementation decisions. This analysis is a significant step towards our ultimate goal of providing guidance to virtual organizations.}, bibtype = {article}, author = {Cowles, R and Jackson, C and Welch, V}, doi = {10.1088/1742-6596/513/3/032022}, journal = {Journal of Physics: Conference Series}, number = {TRACK 3} }
@inproceedings{ title = {A model for identity management in future scientific collaboratories}, type = {inproceedings}, year = {2014}, keywords = {Collaboratories; e-Science; Extreme scale; Identit}, volume = {23-28-Marc}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84976254441&partnerID=40&md5=6e634aeaa09b2745f880e182e1cf237e}, publisher = {Proceedings of Science (PoS)}, id = {263a0fbf-a143-3612-b51c-714204830674}, created = {2018-02-27T18:07:39.087Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.087Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Cowles2014}, source_type = {conference}, notes = {cited By 0; Conference of International Symposium on Grids and Clouds, ISGC 2014 ; Conference Date: 23 March 2014 Through 28 March 2014; Conference Code:121995}, private_publication = {false}, abstract = {Over the past two decades, the virtual organization (VO) has allowed for increasingly large and complex scientific projects spanning multiple organizations and countries. The eXtreme Scale Identity Management (XSIM) project has surveyed a number of these VOs and the resource providers (RPs) that serve them, and built a model expressing the identity management (IdM) implementations supporting these large scientific VOs. The initial model was presented at eScience 2013. This work refines that initial VO-IdM model with XSIM efforts since the original eScience 2013 paper, capturing results from additional interviews and initial applications of the model, and begins to extend the model to include federated IdM environments, portal-based VOs and cloud and exascale RPs. © Copyright owned by the author(s) under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike Licence.}, bibtype = {inproceedings}, author = {Cowles, R and Jackson, C and Welch, V and Cholia, S}, booktitle = {Proceedings of Science} }
@article{ title = {Systematic Government Access to Private-Sector Data Redux}, type = {article}, year = {2014}, id = {e759253c-157d-3700-a087-7cb22af58812}, created = {2018-02-27T18:07:39.357Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.357Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, journal = {International Data Privacy Law} }
@inproceedings{ title = {OSG PKI transition: Experiences and lessons learned}, type = {inproceedings}, year = {2014}, keywords = {Authentication; Distributed computer systems; Proj,Certificate Services; Federated identity; Identit,Public key cryptography}, volume = {23-28-Marc}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84976287425&partnerID=40&md5=91fa0ceddc7a53735878e4a650ae9d76}, publisher = {Proceedings of Science (PoS)}, id = {b38e74ab-7e24-3aa6-aae8-390a47f6aa11}, created = {2018-02-27T18:07:39.588Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.588Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Welch2014}, source_type = {conference}, notes = {cited By 0; Conference of International Symposium on Grids and Clouds, ISGC 2014 ; Conference Date: 23 March 2014 Through 28 March 2014; Conference Code:121995}, private_publication = {false}, abstract = {Over the course of 2012-13 the Open Science Grid (OSG) transitioned the identity management system for its science user community from the DOE Grids public key infrastructure (PKI) to a new OSG PKI. This transition was significant in its scope, touching on nearly all aspects of the OSG infrastructure and community. The transition also entailed the adoption of a commercial certificate service as a key component of OSG's PKI. This transition offers a rare opportunity to better understand identity management and how to prepare for and implement changes in an identity management system. In this paper, we describe OSG's transition and lessons learned from it. We discuss the overall project management approach, including a division of the project into planning, piloting, design, development, implementation and transition phases. We discuss the considered alternatives, both for implementations of the OSG PKI as well as alternatives to a PKI such as federated identity, as well as the criteria we used to make our decision. We conclude with a set of lessons learned from both implementation and in retrospect, and a set of recommendations for other identity systems. © Copyright owned by the author(s) under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike Licence.}, bibtype = {inproceedings}, author = {Welch, V and Deximo, A and Hayashi, S and Khadke, V D and Mathure, R and Quick, R and Altunay, M and Sehgal, C S and Tiradani, A and Basney, J}, booktitle = {Proceedings of Science} }
@techreport{ title = {Report of the 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure}, type = {techreport}, year = {2014}, id = {3dd1453b-b06c-387c-8247-9d1f6a726c6e}, created = {2018-02-27T18:07:39.704Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.704Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Jackson, Craig and Marsteller, James and Welch, Von} }
@techreport{ title = {Report of the 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities: Designing Cybersecurity Programs in Support of Science}, type = {techreport}, year = {2014}, id = {490638d4-35fa-3af4-a49c-5b6fe4b890e0}, created = {2018-02-27T18:07:39.900Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.900Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Jackson, Craig and Marsteller, James and Welch, Von} }
@article{ title = {The (Data Privacy) Law Hasn't Even Checked in When Technology Takes Off}, type = {article}, year = {2014}, pages = {175-176}, volume = {4}, id = {d608010c-961b-3b03-a9f2-12c16ae4e9c6}, created = {2018-02-27T18:07:40.000Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:40.000Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, journal = {International Data Privacy Law}, number = {3} }
@article{ title = {Building a data sharing model for global genomic research}, type = {article}, year = {2014}, pages = {430}, volume = {15}, publisher = {BioMed Central}, id = {db8c1c34-1664-3cfd-bd12-512b72043496}, created = {2018-02-27T18:07:40.490Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:40.490Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Kosseim, Patricia and Dove, Edward S and Baggaley, Carman and Meslin, Eric M and Cate, Fred H and Kaye, Jane and Harris, Jennifer R and Knoppers, Bartha M}, journal = {Genome biology}, number = {8} }
@article{ title = {PRISM and Privacy: Will This Change Everything?}, type = {article}, year = {2013}, pages = {217-219}, volume = {3}, id = {80e15cac-5ef5-3355-8bb8-4a0364802a62}, created = {2018-02-27T18:07:37.051Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.051Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, doi = {https://doi.org/10.1093/idpl/ipt020}, journal = {International Data Privacy Law}, number = {4} }
@article{ title = {The Business of Privacy}, type = {article}, year = {2013}, id = {9e5c9980-d468-3464-9e5b-86d7724322c9}, created = {2018-02-27T18:07:37.210Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.210Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, journal = {International Data Privacy Law} }
@techreport{ title = {CyberGIS-CTSC Engagement Final Report}, type = {techreport}, year = {2013}, id = {b6b35e6b-62f1-39fc-b875-df52956c2472}, created = {2018-02-27T18:07:37.798Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.798Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Butler, Randy and Fleury, Terry and Marsteller, Jim and Welch, Von} }
@book{ title = {Data protection principles for the 21st century}, type = {book}, year = {2013}, publisher = {Microsoft Corporaton}, id = {8d69fe84-1d3e-3908-a266-713869ec0b3f}, created = {2018-02-27T18:07:37.799Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.799Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {book}, author = {Cate, Fred H and Cullen, Peter and Mayer-Schonberger, Viktor} }
@inproceedings{ title = {Identity management factors for HEP virtual organizations}, type = {inproceedings}, year = {2013}, id = {5f24515a-a1b1-302f-a785-9d2a3ff07e33}, created = {2018-02-27T18:07:38.173Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.173Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Cowles, Robert and Jackson, Craig and Welch, Von}, booktitle = {20th International Conference on Computing in High Energy and Nuclear Physics (CHEP2013)} }
@article{ title = {Face-to-Data--Another Developing Privacy Threat?}, type = {article}, year = {2013}, id = {093c0837-ea07-395e-95fb-747083ab31b3}, created = {2018-02-27T18:07:38.363Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.363Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, journal = {International Data Privacy Law} }
@inproceedings{ title = {Science gateway security recommendations}, type = {inproceedings}, year = {2013}, keywords = {Cluster computing,Research,Research communities; Research data; Research resu}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893618339&doi=10.1109%2FCLUSTER.2013.6702697&partnerID=40&md5=2e80780339d239a3e2703947890900ea}, city = {Indianapolis, IN}, id = {22d38573-c69d-32cf-8b43-a9279970382e}, created = {2018-02-27T18:07:38.858Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.858Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Basney2013}, source_type = {conference}, notes = {cited By 0; Conference of 15th IEEE International Conference on Cluster Computing, CLUSTER 2013 ; Conference Date: 23 September 2013 Through 27 September 2013; Conference Code:102435}, private_publication = {false}, abstract = {A science gateway is a web portal that provides a convenient interface to data and applications in support of a research community. Standard security concerns apply to science gateways, including confidentiality of pre-publication research data, integrity of research results, and availability of services provided to researchers. In this paper we identify existing science gateway security recommendations and provide our own perspective. © 2013 IEEE.}, bibtype = {inproceedings}, author = {Basney, J and Welch, V}, doi = {10.1109/CLUSTER.2013.6702697}, booktitle = {Proceedings - IEEE International Conference on Cluster Computing, ICCC} }
@techreport{ title = {Status, Strategies and Future Plans-OSG PKI Transition}, type = {techreport}, year = {2013}, id = {93a5db77-698a-3296-9319-29e0edaa02da}, created = {2018-02-27T18:07:39.134Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.134Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {techreport}, author = {Welch, Von} }
@techreport{ title = {Year 1 Report: Center for Trustworthy Scientific Cyberinfrastructure}, type = {techreport}, year = {2013}, websites = {http://hdl.handle.net/2022/20401}, month = {10}, publisher = {CTSC}, city = {Bloomington, IN}, institution = {Indiana University}, id = {aa1abab0-7401-3d8f-841f-4a47001d8511}, created = {2018-02-27T18:07:39.580Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.580Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, abstract = {This report covers CTSC project year three, from October 2014 through September 2015, during which time CTSC engaged with nine NSF CI projects, organized and hosted the 2015 NSF Cybersecurity Summits for Large Facilities and Cyberinfrastructure, developed and provided training in developing cybersecurity programs, secure coding, and incident response, provided the community guidance with dealing with vulnerabilities, and authored and submitted to NSF a section on cybersecurity for the NSF Large Facilities Manual.}, bibtype = {techreport}, author = {Welch, Von} }
@article{ title = {The Extraterritoriality of Data Privacy Laws--An Explosive Issue Yet to Detonate}, type = {article}, year = {2013}, pages = {147-148}, volume = {3}, id = {13f118d9-de84-330a-b8f1-0066d714d395}, created = {2018-02-27T18:07:39.619Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.619Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, doi = {https://doi.org/10.1093/idpl/ipt009}, journal = {International Data Privacy Law}, number = {3} }
@techreport{ title = {HIPAA and Advanced Scientific Computing}, type = {techreport}, year = {2013}, id = {5d21ea86-5d9d-3407-8a3c-fe4d14ccbce4}, created = {2018-02-27T18:07:39.648Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.648Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Shankar, Anurag and Barnett, William} }
@article{ title = {Notice and Consent in a World of Big Data}, type = {article}, year = {2013}, keywords = {2013,pti}, pages = {67-73}, volume = {3}, websites = {http://idpl.oxfordjournals.org/content/3/2/67.abstract}, chapter = {67}, id = {3ac3a326-39bd-30fd-8fa4-b8a13bee877f}, created = {2018-02-27T18:07:39.842Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.842Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {false}, hidden = {false}, source_type = {article}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Mayer-Schonberger, Viktor}, journal = {International Data Privacy Law} }
@inproceedings{ title = {Identity Management for Virtual Organizations: An Experience-Based Model}, type = {inproceedings}, year = {2013}, keywords = {Collaboration,Computation theory,Identity management,Risks,Security,Tru}, pages = {278-284}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893499173&doi=10.1109%2FeScience.2013.47&partnerID=40&md5=5f290ab32369f2caa599bf22f6c9aa1c,http://ieeexplore.ieee.org/document/6683918/}, month = {10}, publisher = {IEEE}, city = {Beijing}, id = {f5d566ed-00b0-3b35-a7f9-f79f361402d6}, created = {2018-02-27T18:07:40.015Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-12T18:48:09.384Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Cowles2013278}, source_type = {conference}, notes = {cited By 0; Conference of 9th IEEE International Conference on e-Science, e-Science 2013 ; Conference Date: 22 October 2013 Through 25 October 2013; Conference Code:102409}, private_publication = {false}, abstract = {In this paper we present our Virtual Organization (VO) Identity Management (IdM) Model, an overview of 14 interviews that informed it, and preliminary analysis of the factors that guide VOs and Resource Providers (RPs) to choose a particular IdM implementation. This model will serve both existing and future VOs and RPs to more effectively understand and implement their IdM relationships. The Virtual Organization has emerged as a fundamental way of structuring modern scientific collaborations and has shaped the computing infrastructure that supports those collaborations. One key aspect of this infrastructure is identity management, and the emergence of VOs introduces challenges regarding how much of the IdM process should be delegated from the RP to the VO. Many different implementation choices have been made; we conducted semi-structured interviews with 14 different VOs or RPs regarding their IdM choices and the bases behind those decisions. We analyzed the interview results to extract common parameters and values, which we used to inform our VO IdM Model. Copyright © 2013 by The Institute of Electrical and Electronics Engineers, Inc.}, bibtype = {inproceedings}, author = {Cowles, Robert and Jackson, Craig and Welch, Von}, doi = {10.1109/eScience.2013.47}, booktitle = {2013 IEEE 9th International Conference on e-Science} }
@techreport{ title = {Globus Online Security Review}, type = {techreport}, year = {2012}, id = {b98eb871-2a08-3e09-88da-16201cf6af29}, created = {2018-02-27T18:07:36.669Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:36.669Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Welch, Von} }
@techreport{ title = {OSG Certificate Authority Implementation Plan}, type = {techreport}, year = {2012}, id = {6337405c-3144-364d-8c65-7fda94f0c552}, created = {2018-02-27T18:07:36.985Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:36.985Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {techreport}, author = {Welch, Von} }
@article{ title = {PRIVACY, CONSUMER CREDIT, AND THE}, type = {article}, year = {2012}, pages = {229}, publisher = {Springer Science & Business Media}, id = {32bae934-70c1-3ae9-aca6-f6a48c1f65f6}, created = {2018-02-27T18:07:37.542Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.542Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H}, journal = {The Impact of Public Policy on Consumer Credit} }
@article{ title = {The commodification of information and the control of expression}, type = {article}, year = {2012}, pages = {3-7}, volume = {2002}, id = {e3beb06e-2029-332d-9ba0-fad56c080d68}, created = {2018-02-27T18:07:38.059Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.059Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H}, journal = {Amicus Curiae}, number = {43} }
@article{ title = {The Supreme Court and information privacy}, type = {article}, year = {2012}, pages = {255-267}, volume = {2}, publisher = {Oxford University Press}, id = {f0332483-97d1-321c-8332-adaf3cd5b4c7}, created = {2018-02-27T18:07:38.947Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.947Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Cate, Beth E}, journal = {International Data Privacy Law}, number = {4} }
@techreport{ title = {Security at the Cyber Border: Exploring Cybersecurity for International Research Network Connections}, type = {techreport}, year = {2012}, id = {90ef9c63-23fc-33d9-b680-fbb055ab9565}, created = {2018-02-27T18:07:39.144Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.144Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Welch, Von and Pearson, Douglas and Tierney, Brian and Williams, James} }
@article{ title = {The End of the Beginning}, type = {article}, year = {2012}, pages = {115-116}, volume = {2}, id = {82b487af-2b3a-3c1b-b69b-999a155edf6e}, created = {2018-02-27T18:07:39.893Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.893Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, doi = {https://doi.org/10.1093/idpl/ips012}, journal = {International Data Privacy Law}, number = {3} }
@article{ title = {The Intricacies of Independence}, type = {article}, year = {2012}, pages = {1-2}, volume = {2}, id = {949f2cb0-5a77-3ef8-a10a-83358fe2b740}, created = {2018-02-27T18:07:40.545Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:40.545Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantession, Dan Jerker B}, doi = {https://doi.org/10.1093/idpl/ipr021}, journal = {International Data Privacy Law}, number = {1} }
@techreport{ title = {OSG DigiCert Pilot Report}, type = {techreport}, year = {2012}, publisher = {OSG-doc-1097, March2012. http://osg-docdb. opensciencegrid. org/cgibin/ShowDocument}, id = {c6bb0471-b4ad-3e0b-bf6b-dc3c286c8d70}, created = {2018-02-27T18:07:41.895Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:41.895Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {GEN}, private_publication = {false}, bibtype = {techreport}, author = {Altunay, Mine and Basney, Jim and Fischer, Jeremy and Sehgal, Chander and Welch, Von} }
@techreport{ title = {A roadmap for using NSF cyberinfrastructure with InCommon}, type = {techreport}, year = {2011}, websites = {http://hdl.handle.net/2022/13024}, id = {b22173f5-87d9-3e3d-b589-febe9e7e96d7}, created = {2018-02-27T18:07:36.673Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-11T16:36:20.389Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Barnett, William and Welch, Von and Walsh, Alan and Stewart, Craig A} }
@inproceedings{ title = {Cyberinfrastructure Usage Modalities on the TeraGrid}, type = {inproceedings}, year = {2011}, keywords = {Component,Cyber infrastructures,Distributed parameter networks,Production grid}, pages = {932-939}, websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-83455229513&doi=10.1109%2FIPDPS.2011.239&partnerID=40&md5=1e102f58325dedaab0719725dcafbc9a,http://ieeexplore.ieee.org/document/6008940/}, month = {5}, publisher = {IEEE}, city = {Anchorage, AK}, id = {30b2e756-97ff-378d-8183-50baec2c7fdf}, created = {2018-02-27T18:07:36.847Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-12T18:48:09.373Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Katz2011932}, source_type = {conference}, notes = {cited By 7; Conference of 25th IEEE International Parallel and Distributed Processing Symposium, Workshops and Phd Forum, IPDPSW 2011 ; Conference Date: 16 May 2011 Through 20 May 2011; Conference Code:87731}, private_publication = {false}, abstract = {This paper is intended to explain how the TeraGrid would like to be able to measure "usage modalities." We would like to (and are beginning to) measure these modalities to understand what objectives our users are pursuing, how they go about achieving them, and why, so that we can make changes in the TeraGrid to better support them. © 2011 IEEE.}, bibtype = {inproceedings}, author = {Katz, Daniel S and Hart, David and Jordan, Chris and Majumdar, Amit and Navarro, J.P. and Smith, Warren and Towns, John and Welch, Von and Wilkins-Diehr, Nancy}, doi = {10.1109/IPDPS.2011.239}, booktitle = {Proceedings of the 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum (IPDPSW '11)} }
@techreport{ title = {Indiana University's Advanced Cyberinfrastructure}, type = {techreport}, year = {2011}, id = {9803b22b-5dce-345e-98fe-36207419bf9f}, created = {2018-02-27T18:07:37.140Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.140Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Arenson, Andrew and Boyles, Michael and Cruise, Robert and Gopu, Arvind and Hart, David and Lindenlaub, Peg and Papakhian, Mary and Samuel, John and Seiffert, Kurt and Shankar, Anurag} }
@article{ title = {Let's Not Kill All the Privacy Laws (and Lawyers)}, type = {article}, year = {2011}, volume = {1}, id = {4b9484fd-89b4-3dae-bc2c-26a490f9ab9c}, created = {2018-02-27T18:07:37.513Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.513Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, doi = {10.1093/idpl/ipr016}, journal = {International Data Privacy Law}, number = {4} }
@techreport{ title = {A Roadmap for Using NSF Cyberinfrastructure with InCommon: Abbreviated Version}, type = {techreport}, year = {2011}, id = {8f018375-d437-348d-be11-38e16c23d9ef}, created = {2018-02-27T18:07:38.067Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.067Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Barnett, William and Welch, Von and Walsh, Alan and Stewart, Craig A} }
@article{ title = {A Transatlantic Convergence on Privacy?}, type = {article}, year = {2011}, pages = {76-79}, volume = {9}, publisher = {IEEE}, id = {ad6da504-dbba-3e7c-9749-a222d3369d41}, created = {2018-02-27T18:07:38.089Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.089Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H}, journal = {IEEE Security & Privacy}, number = {1} }
@techreport{ title = {Report of NSF Workshop Series on Scientific Software Security Innovation Institute}, type = {techreport}, year = {2011}, id = {cead1570-96f0-3b23-a102-6d01f8593765}, created = {2018-02-27T18:07:38.615Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.615Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Butler, Randy and Welch, Von and Basney, Jim and Koranda, Scott and Barnett, William K and Pearson, Doug} }
@article{ title = {Moving Forward Together}, type = {article}, year = {2011}, pages = {81-82}, volume = {1}, id = {a380f8af-5e05-321d-92aa-b100b2c244cc}, created = {2018-02-27T18:07:38.680Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.680Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, doi = {https://doi.org/10.1093/idpl/ipr005}, journal = {International Data Privacy Law}, number = {2} }
@article{ title = {Privacy--An Elusive Concept}, type = {article}, year = {2011}, volume = {1}, id = {a5b74576-6889-3652-8d9e-9dd22146a442}, created = {2018-02-27T18:07:38.917Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.917Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Kuner, Christopher and Millard, Christopher and Svantesson, Dan Jerker B}, journal = {International Data Privacy Law}, number = {3} }
@techreport{ title = {Overview of NSF ACCI Task Force on Campus Bridging Report}, type = {techreport}, year = {2011}, id = {cf656f22-11bd-336e-b53f-20b6787ed2f3}, created = {2018-02-27T18:07:40.173Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:40.173Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {techreport}, author = {Stewart, Craig A and Welch, Von} }
@techreport{ title = {Campus Bridging: Software & Software Service Issues Workshop Report}, type = {techreport}, year = {2011}, id = {609d244d-2603-3dfd-a09e-62d7caacb7d4}, created = {2018-02-27T18:07:40.181Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:40.181Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {McGee, John and Welch, Von and Almes, Guy T} }
@article{ title = {An analysis of the benefits and risks to LIGO when participating in identity federations}, type = {article}, year = {2011}, id = {688d3393-02b6-3940-808f-49bf811aae46}, created = {2018-02-27T18:07:40.276Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:40.276Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Basney, Jim and Koranda, Scott and Welch, Von}, journal = {LIGO document number LIGOG1100964v2, September} }
@inproceedings{ title = {A roadmap for using NSF cyberinfrastructure with InCommon}, type = {inproceedings}, year = {2011}, pages = {1}, websites = {http://dl.acm.org/citation.cfm?doid=2016741.2016771}, publisher = {ACM Press}, city = {New York, New York, USA}, id = {aa4bf0fa-52c6-36d1-85fd-ecf684cba269}, created = {2019-09-11T16:36:19.468Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-11T16:36:19.468Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {The "Roadmap for Using NSF Cyberinfrastructure with InCommon" provides an in-depth discussion of benefits, challenges and practices for using the InCommon identity federation with National Science Foundation (NSF) cyberinfrastructure. In this abstract, we provide a summary of the Roadmap, the complete version of which can be found online [1]. © 2011 Authors.}, bibtype = {inproceedings}, author = {Welch, Von and Walsh, Alan and Barnett, William and Stewart, Craig A.}, doi = {10.1145/2016741.2016771}, booktitle = {Proceedings of the 2011 TeraGrid Conference on Extreme Digital Discovery - TG '11} }
@article{ title = {The limits of notice and choice}, type = {article}, year = {2010}, volume = {8}, publisher = {IEEE}, id = {2ada7c6f-bcf7-3d41-a89c-0fe879e14fd8}, created = {2018-02-27T18:07:37.214Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:37.214Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H}, journal = {IEEE Security & Privacy}, number = {2} }
@article{ title = {Protecting privacy in health research: the limits of individual choice}, type = {article}, year = {2010}, pages = {1765-1803}, publisher = {JSTOR}, id = {e17034ee-7c4a-3309-9084-b6479164d763}, created = {2018-02-27T18:07:39.356Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.356Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H}, journal = {California Law Review} }
@inproceedings{ title = {Workflows for parameter studies of multi-cell modeling}, type = {inproceedings}, year = {2010}, pages = {1}, websites = {http://portal.acm.org/citation.cfm?doid=1878537.1878635}, publisher = {ACM Press}, city = {New York, New York, USA}, id = {f194841c-7704-30cf-8d8e-f2c5dc535919}, created = {2019-09-12T14:53:02.740Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-09-12T14:53:02.740Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, abstract = {Running simulations for multi-cell tissue models can involve numerous parameters and consume considerable computing resources. This paper presents an overview and use case of two open source projects - CompuCell3D, a multi-cell modeling framework, and VisTrails, a workflow system for parameter exploration and data management.}, bibtype = {inproceedings}, author = {Heiland, Randy and Swat, Maciek and Zaitlen, Benjamin and Glazier, James and Lumsdaine, Andrew}, doi = {10.1145/1878537.1878635}, booktitle = {Proceedings of the 2010 Spring Simulation Multiconference on - SpringSim '10} }
@article{ title = {Updating Data Protection: Part I--Identifying the Objectives}, type = {article}, year = {2009}, id = {61cf192d-4e0d-3210-a1e0-cecd604abe97}, created = {2018-02-27T18:07:36.670Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:36.670Z}, read = {true}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H}, journal = {Published by the Centre for Information Policy Leadership} }
@article{ title = {Security, privacy, and the role of law}, type = {article}, year = {2009}, volume = {7}, publisher = {IEEE}, id = {a296ed82-4823-3f3f-baca-42e486b86f89}, created = {2018-02-27T18:07:36.959Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:36.959Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H}, journal = {IEEE Security & Privacy}, number = {5} }
@article{ title = {Dos and Don'ts of Data Breach and Information Security Policy}, type = {article}, year = {2009}, id = {6c6d4522-c6ab-3075-bdc4-253f08881841}, created = {2018-02-27T18:07:38.381Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.381Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Cate, Fred H and Abrams, Martin E and Bruening, Paula J and Swindle, Orson}, journal = {Published by the Centre for Information Policy Leadership} }
@book{ title = {TeraGrid: Analysis of organization, system architecture, and middleware enabling new types of applications}, type = {book}, year = {2008}, source = {Advances in Parallel Computing}, pages = {225-249}, volume = {16}, websites = {http://ebooks.iospress.nl/publication/26292}, id = {47e3b2b8-4ddf-3527-b262-aed725a1d785}, created = {2018-02-27T18:07:36.723Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2019-10-01T18:15:25.845Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {TeraGrid is a national-scale computational science facility supported through a partnership among thirteen institutions, with funding from the US National Science Foundation [1]. Initially created through a Major Research Equipment Facilities Construction (MREFC [2] ) award in 2001, the TeraGrid facility began providing production computing, storage, visualization, and data collections services to the national science, engineering, and education community in January 2004. In August 2005 NSF funded a five-year program to operate, enhance, and expand the capacity and capabilities of the TeraGrid facility to meet the growing needs of the science and engineering community through 2010. This paper describes TeraGrid in terms of the structures, architecture, technologies, and services that are used to provide national-scale, open cyberinfrastructure. The focus of the paper is specifically on the technology approach and use of middleware for the purposes of discussing the impact of such approaches on scientific use of computational infrastructure. While there are many individual science success stories, we do not focus on these in this paper. Similarly, there are many software tools and systems deployed in TeraGrid but our coverage is of the basic system middleware and is not meant to be exhaustive of all technology efforts within TeraGrid. We look in particular at growth and events during 2006 as the user population expanded dramatically and reached an initial 'tipping point' with respect to adoption of new 'grid' capabilities and usage modalities. © 2008 The authors and IOS Press.}, bibtype = {book}, author = {Catlett, C. and Allcock, W. E. and Andrews, P. and Aydt, R. and Bair, R. and Balac, N. and Banister, B. and Barker, T. and Bartelt, M. and Beckman, P. and Berman, F. and Bertoline, G. and Blatecky, A. and Boisseau, J. and Bottum, J. and Brunett, S. and Bunn, J. and Butler, M. and Carver, D. and Cobb, J. and Cockerill, T. and Couvares, P.F. and Dahan, M. and Diehl, D. and Dunning, T. and Foster, I. and Gaither, K. and Gannon, D. and Goasguen, S. and Grobe, M. and Hart, D. and Heinzel, M. and Hempel, C. and Huntoon, W. and Insley, J. and Jordan, C. and Judson, I. and Kamrath, A. and Karonis, N. and Kesselman, C. and Kovatch, P. and Lane, L. and Lathrop, S. and Levine, M. and Lifka, D. and Liming, L. and Livny, M. and Loft, R. and Marcusiu, D. and Marsteller, J. and Martin, S. and McCaulay, S. and McGee, J. and McGinnis, L. and McRobbie, M. and Messina, P. and Moore, R. and Moore, R. and Navarro, J.P. and Nichols, J. and Papka, M.E. and Pennington, R. and Pike, G. and Pool, J. and Reddy, R. and Reed, D. and Rimovsky, T. and Roberts, E. and Roskies, R. and Sanielevici, S. and Scott, J.R. and Shankar, A. and Sheddon, M. and Showerman, M. and Simmel, D. and Singer, A. and Skow, D. and Smallen, S. and Smith, W. and Song, C. and Stevens, R. and Stewart, C. and Stock, R.B. and Stone, N. and Towns, J. and Urban, T. and Vildibill, M. and Walker, E. and Welch, V. and Wilkins-Diehr, N. and Williams, R. and Winkler, L. and Zhao, L. and Zimmerman, A.} }
@inproceedings{ title = {The introduction of the OSCAR database API (ODA)}, type = {inproceedings}, year = {2006}, pages = {39}, publisher = {IEEE}, id = {f67c8088-22af-3547-b8dc-27d94cabf55e}, created = {2018-02-27T18:07:38.018Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.018Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Kim, DongInn and Squyres, Jeffrey M and Lumsdaine, Andrew}, booktitle = {High-Performance Computing in an Advanced Collaborative Environment, 2006. HPCS 2006. 20th International Symposium on} }
@inproceedings{ title = {Revamping the OSCAR database: A flexible approach to cluster configuration data management}, type = {inproceedings}, year = {2005}, pages = {326-332}, publisher = {IEEE}, id = {ccb87ddd-b989-35ac-98f9-3f3df6f48c63}, created = {2018-02-27T18:07:38.553Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.553Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Kim, DongInn and Squyres, Jeffrey M and Lumsdaine, Andrew}, booktitle = {High Performance Computing Systems and Applications, 2005. HPCS 2005. 19th International Symposium on} }
@techreport{ title = {University Information Technology Services' Advanced IT Facilities: The least every researcher needs to know}, type = {techreport}, year = {2003}, id = {02f3537c-6d88-3d6c-a35c-9bfde87e0ee7}, created = {2018-02-27T18:07:39.407Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:39.407Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Cruise, Robert and Hart, David and Papakhian, Mary and Repasky, Richard and Samuel, John and Shankar, Anurag and Stewart, Craig A and Wernert, Eric} }
@techreport{ title = {2003 Report on Indiana University Accomplishments supported by Shared University Research Grants from IBM, Inc.}, type = {techreport}, year = {2003}, id = {e1cbbdc0-0707-3896-be15-730df1b526be}, created = {2018-02-27T18:07:40.552Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:40.552Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Stewart, Craig A and Papakhian, Mary and Hart, David and Shankar, Anurag and Arenson, Andrew and McMullen, D F and Palakal, Mathew and Dalkilic, Mehmet and Ortoleva, Peter} }
@techreport{ title = {INGEN's advanced IT facilities: The least you need to know}, type = {techreport}, year = {2002}, id = {fc79f07f-8b42-350c-99cb-b325c7f907bf}, created = {2018-02-27T18:07:38.916Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.916Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Cruise, Robert and Hart, David and Papakhian, Mary and Repasky, Richard and Samuel, John and Shankar, Anurag and Stewart, Craig A and Wernert, Eric} }
@techreport{ title = {Research and Academic Computing Implementation Plan}, type = {techreport}, year = {2000}, id = {19183dd6-0cd7-38ce-9c7f-194445154822}, created = {2018-02-27T18:07:38.650Z}, file_attached = {false}, profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d}, group_id = {411048e7-0d47-3d3c-90c2-fad3d2bd6235}, last_modified = {2018-02-27T18:07:38.650Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {RPRT}, private_publication = {false}, bibtype = {techreport}, author = {Peebles, Christopher S and Stewart, Craig A and Bernbom, Gerry and McMullen, Donald F and Shankar, Anurag and Samuel, John and Daniels, John and Papakhian, Mary and Hart, David and Walsh, John} }