The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jim Basney: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Markus Lorch, Jim Basney, Dennis G. Kafura
    A hardware-secured credential repository for Grid PKIs. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2004, pp:640-647 [Conf]
  2. Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, Marianne Winslett
    Negotiating Trust on the Grid. [Citation Graph (0, 0)][DBLP]
    Semantic Grid, 2005, pp:- [Conf]
  3. Jim Basney, Miron Livny
    Managing Network Resources in Condor. [Citation Graph (0, 0)][DBLP]
    HPDC, 2000, pp:298-299 [Conf]
  4. Douglas Thain, Jim Basney, Se-Chang Son, Miron Livny
    The Kangaroo Approach to Data Movement on the Grid. [Citation Graph (0, 0)][DBLP]
    HPDC, 2001, pp:325-333 [Conf]
  5. Andrew S. Grimshaw, Marty A. Humphrey, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill, Glenn S. Wasson, Jim Basney
    The Development of Dependable and Survivable Grids. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2005, pp:729-737 [Conf]
  6. Jonathan Martin, Jim Basney, Marty Humphrey
    Extending Existing Campus Trust Relationships to the Grid Through the Integration of Pubcookie and MyProxy. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2005, pp:501-508 [Conf]
  7. Himanshu Khurana, Rafael Bonilla, Adam J. Slagell, Raja Afandi, Hyung-Seok Hahm, Jim Basney
    Scalable Group Key Management with Partially Trusted Controllers. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:662-672 [Conf]
  8. David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam
    CredEx: User-Centric Credential Management for Grid and Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:149-156 [Conf]
  9. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
    Traust: A Trust Negotiation Based Authorization Service. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:458-462 [Conf]
  10. Jim Basney, Rajesh Raman, Miron Livny
    High Throughput Monte Carlo. [Citation Graph (0, 0)][DBLP]
    PPSC, 1999, pp:- [Conf]
  11. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
    Traust: a trust negotiation-based authorization service for open systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:39-48 [Conf]
  12. Bruce Beckles, Von Welch, Jim Basney
    Mechanisms for increasing the usability of grid security. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:74-101 [Journal]
  13. Jim Basney, Marty Humphrey, Von Welch
    The MyProxy online credential repository. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:9, pp:801-816 [Journal]
  14. Marty Humphrey, Jim Basney, Jim Jokl
    The case for using Bridge Certificate Authorities for Grid computing. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:9, pp:817-826 [Journal]
  15. Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee, S. Lennart Johnsson
    Toward an On-Demand Restricted Delegation Mechanism for Grids. [Citation Graph (0, 0)][DBLP]
    GRID, 2006, pp:152-159 [Conf]
  16. Daniel Kouril, Jim Basney
    A credential renewal service for long-running jobs. [Citation Graph (0, 0)][DBLP]
    GRID, 2005, pp:63-68 [Conf]
  17. Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill, Jim Basney, Yuliyan Kiryakov, John C. Knight, Anh Nguyen-Tuong, Andrew S. Grimshaw, Marty Humphrey
    Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections. [Citation Graph (0, 0)][DBLP]
    HPCC, 2007, pp:260-272 [Conf]
  18. Randy Butler, Mark Servilla, Stuart Gage, Jim Basney, Von Welch, Bill Baker, Terry Fleury, Patrick Duda, David Gehrig, Michael Bletzinger, Jing Tao, D. Michael Freemon
    Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2007, v:10, n:3, pp:301-310 [Journal]

  19. Security Credential Mapping in Grids. [Citation Graph (, )][DBLP]


  20. Workflows in Dynamic and Restricted Delegation. [Citation Graph (, )][DBLP]


  21. Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems. [Citation Graph (, )][DBLP]


  22. Meeting virtual organization performance goals through adaptive grid reconfiguration. [Citation Graph (, )][DBLP]


  23. Dynamic, context-aware, least-privilege grid delegation. [Citation Graph (, )][DBLP]


  24. Single sign-on for java web start applications using myproxy. [Citation Graph (, )][DBLP]


  25. Palantir: a framework for collaborative incident response and investigation. [Citation Graph (, )][DBLP]


  26. Usable secure mailing lists with untrusted servers. [Citation Graph (, )][DBLP]


  27. Federated login to TeraGrid. [Citation Graph (, )][DBLP]


  28. A AAAA model to support science gateways with community accounts. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002