{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:40:10Z","timestamp":1747201210410,"version":"3.40.5"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100005595","name":"University of California","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005595","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006132","name":"Office of Science","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006132","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,17]]},"DOI":"10.1109\/icnc64010.2025.10993877","type":"proceedings-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T17:44:51Z","timestamp":1747158291000},"page":"57-61","source":"Crossref","is-referenced-by-count":0,"title":["Improving Data Mobility Through Modern Security Infrastructure"],"prefix":"10.1109","author":[{"given":"Jason","family":"Zurawski","sequence":"first","affiliation":[{"name":"Lawrence Berkeley National Laboratory (LBNL),Energy Sciences Network (ESnet),Berkeley,CA,USA"}]},{"given":"Ezra","family":"Kissel","sequence":"additional","affiliation":[{"name":"Lawrence Berkeley National Laboratory (LBNL),Energy Sciences Network (ESnet),Berkeley,CA,USA"}]},{"given":"George","family":"Robb","sequence":"additional","affiliation":[{"name":"Lawrence Berkeley National Laboratory (LBNL),Energy Sciences Network (ESnet),Berkeley,CA,USA"}]},{"given":"Corey","family":"Eichelberger","sequence":"additional","affiliation":[{"name":"University of Texas at Austin,Texas Advanced Computing Center (TACC),Austin,TX,USA"}]},{"given":"Nathaniel","family":"Mendoza","sequence":"additional","affiliation":[{"name":"University of Texas at Austin,Texas Advanced Computing Center (TACC),Austin,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503245"},{"volume-title":"The International Conference for High Performance Computing, Networking, Storage, and Analysis","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2172\/2008205"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2830318.2830322"},{"volume-title":"HPN-SSH: High performance SSH\/SCP","key":"ref7"},{"volume-title":"Engagement and Performance Operations Center (EPOC)","key":"ref8"},{"key":"ref9","article-title":"The International Conference for High Performance Computing, Networking, Storage, and Analysis"},{"volume-title":"DOE\u2019s Integrated Research Infrastructure Program","key":"ref10"},{"volume-title":"Campus Cyberinfrastructure (CC*)","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1109\/LCN60385.2024.10639626","article-title":"Science DMZ Networks: How Different Are They Really?","volume-title":"2024 IEEE 50th Conference on Local Computer Networks (LCN)","author":"Mutter"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2172\/946807"},{"key":"ref15","article-title":"Science DMZ: Secure High Performance Data Transfer","volume-title":"Center for Applied Cybersecurity Research","author":"Abhinit","year":"2022"},{"key":"ref16","article-title":"Transmission Control Protocol. Request for Comments (Standard) 793","author":"Postel","year":"1981","journal-title":"Internet Engineering Task Force"},{"volume-title":"DTN Tuning","key":"ref18"},{"volume-title":"ESnet Network","key":"ref19"}],"event":{"name":"2025 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2025,2,17]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2025,2,20]]}},"container-title":["2025 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10993495\/10993515\/10993877.pdf?arnumber=10993877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:16:12Z","timestamp":1747199772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10993877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icnc64010.2025.10993877","relation":{},"subject":[],"published":{"date-parts":[[2025,2,17]]}}}