{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:38Z","timestamp":1750307198378,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,11,18]],"date-time":"2011-11-18T00:00:00Z","timestamp":1321574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,11,18]]},"DOI":"10.1145\/2110486.2110489","type":"proceedings-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T14:49:33Z","timestamp":1328021373000},"page":"13-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Distributed web security for science gateways"],"prefix":"10.1145","author":[{"given":"Jim","family":"Basney","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana, IL, USA"}]},{"given":"Rion","family":"Dooley","sequence":"additional","affiliation":[{"name":"University of Texas, Austin, TX, USA"}]},{"given":"Jeff","family":"Gaynor","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana, IL, USA"}]},{"given":"Suresh","family":"Marru","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Marlon","family":"Pierce","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,11,18]]},"reference":[{"volume-title":"National Science Foundation Advisory Committee for Cyberinfrastructure Campus Bridging Task Force Report: Workshop on Software and Services. http:\/\/pti.iu.edu\/campusbridging","author":"McGee J.","key":"e_1_3_2_1_1_1","unstructured":"J. McGee , V. Welch , G. Almes (eds). National Science Foundation Advisory Committee for Cyberinfrastructure Campus Bridging Task Force Report: Workshop on Software and Services. http:\/\/pti.iu.edu\/campusbridging J. McGee, V. Welch, G. Almes (eds). National Science Foundation Advisory Committee for Cyberinfrastructure Campus Bridging Task Force Report: Workshop on Software and Services. http:\/\/pti.iu.edu\/campusbridging"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2010.5676129"},{"key":"e_1_3_2_1_3_1","unstructured":"CILogon Service. http:\/\/www.cilogon.org\/service  CILogon Service. http:\/\/www.cilogon.org\/service"},{"key":"e_1_3_2_1_4_1","volume-title":"TeraGrid Conference","author":"Price K.","year":"2006","unstructured":"K. Price , \"Restricted Community Accounts\" , TeraGrid Conference , June 2006 . K. Price, \"Restricted Community Accounts\", TeraGrid Conference, June 2006."},{"key":"e_1_3_2_1_5_1","unstructured":"E. Hammer-Lahav \"OAuth 2.0 (without Signatures) is Bad for the Web\" http:\/\/hueniverse.com\/2010\/09\/oauth-2-0-without-signatures-is-bad-for-the-web\/ (September 2010).  E. Hammer-Lahav \"OAuth 2.0 (without Signatures) is Bad for the Web\" http:\/\/hueniverse.com\/2010\/09\/oauth-2-0-without-signatures-is-bad-for-the-web\/ (September 2010)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v21:3"},{"volume-title":"5th Grid Computing Environments Workshop, http:\/\/portal.acm.org\/citation.cfm?id=1658260","key":"e_1_3_2_1_7_1","unstructured":"Proceedings of the 5th Grid Computing Environments Workshop, http:\/\/portal.acm.org\/citation.cfm?id=1658260 Proceedings of the 5th Grid Computing Environments Workshop, http:\/\/portal.acm.org\/citation.cfm?id=1658260"},{"key":"e_1_3_2_1_8_1","unstructured":"Gateway Computing Environments 2010 (GCE10) Workshop http:\/\/www.collab-ogce.org\/gce10\/  Gateway Computing Environments 2010 (GCE10) Workshop http:\/\/www.collab-ogce.org\/gce10\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Papers and Publications by GridChem Users https:\/\/www.gridchem.org\/papers\/.  Papers and Publications by GridChem Users https:\/\/www.gridchem.org\/papers\/."},{"key":"e_1_3_2_1_10_1","volume-title":"November 26","author":"Basney J.","year":"2005","unstructured":"J. Basney , \"MyProxy Protocol\" , Global Grid Forum Experimental Document GFD-E.54 , November 26 , 2005 . J. Basney, \"MyProxy Protocol\", Global Grid Forum Experimental Document GFD-E.54, November 26, 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11577188_2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.889094"},{"key":"e_1_3_2_1_13_1","volume-title":"Twelfth International Symposium on High Performance Distributed Computing (HPDC-12)","author":"Welch V.","year":"2003","unstructured":"V. Welch , Twelfth International Symposium on High Performance Distributed Computing (HPDC-12) , IEEE Press , June 2003 . V. Welch et al., \"Security for Grid Services\", Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), IEEE Press, June 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"International Workshop on Grid Computing Environments","author":"Scavo T.","year":"2007","unstructured":"T. Scavo and V. Welch , \" A Grid Authorization Model for Science Gateways \", International Workshop on Grid Computing Environments , 2007 . T. Scavo and V. Welch, \"A Grid Authorization Model for Science Gateways\", International Workshop on Grid Computing Environments, 2007."},{"key":"e_1_3_2_1_15_1","unstructured":"TeraGrid Gateway Security Summit San Diego January 28--30 2008.  TeraGrid Gateway Security Summit San Diego January 28--30 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016741.2016781"},{"key":"e_1_3_2_1_17_1","unstructured":"IRODS\n  : Data Grids Digital Libraries Persistent Archives and Real-Time Data Systems https:\/\/www.irods.org.  IRODS: Data Grids Digital Libraries Persistent Archives and Real-Time Data Systems https:\/\/www.irods.org."},{"volume-title":"Workshop on Science Gateways, http:\/\/agenda.ct.infn.it\/conferenceDisplay.py?confId=347","key":"e_1_3_2_1_18_1","unstructured":"International Workshop on Science Gateways, http:\/\/agenda.ct.infn.it\/conferenceDisplay.py?confId=347 International Workshop on Science Gateways, http:\/\/agenda.ct.infn.it\/conferenceDisplay.py?confId=347"},{"key":"e_1_3_2_1_19_1","volume-title":"First International Workshop on Managing Insider Security Threats","author":"Kupsch J.","year":"2009","unstructured":"J. Kupsch and B. Miller , \" Manual vs. Automated Vulnerability Assessment: A Case Study \", First International Workshop on Managing Insider Security Threats , West Lafayette, IN , June 2009 . J. Kupsch and B. Miller, \"Manual vs. Automated Vulnerability Assessment: A Case Study\", First International Workshop on Managing Insider Security Threats, West Lafayette, IN, June 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866852"},{"key":"e_1_3_2_1_21_1","volume-title":"Gateway Computing Environments Workshop (GCE10)","author":"Hanlon M.","year":"2010","unstructured":"M. Hanlon : A Phylogenetically Structured Social Network \", Gateway Computing Environments Workshop (GCE10) , New Orleans, LA , November 14, 2010 . M. Hanlon et al., \"My-Plant.org: A Phylogenetically Structured Social Network\", Gateway Computing Environments Workshop (GCE10), New Orleans, LA, November 14, 2010."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/874077.876529"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v35:9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2010.5676125"},{"key":"e_1_3_2_1_25_1","volume-title":"September 22","author":"E.","year":"2011","unstructured":"E. Hammer-Lahav (ed), D. Recordon and D. Hardt , \" The OAuth 2.0 Authorization Protocol \", September 22 , 2011 . https:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2 E. Hammer-Lahav (ed), D. Recordon and D. Hardt, \"The OAuth 2.0 Authorization Protocol\", September 22, 2011. https:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2"},{"key":"e_1_3_2_1_26_1","volume-title":"October 18","author":"Tschofenig H.","year":"2010","unstructured":"H. Tschofenig and B. Cook , \" Thoughts about Digital Signatures for the Open Web Authentication (OAuth) Protocol \", October 18 , 2010 , https:\/\/tools.ietf.org\/html\/draft-tschofenig-oauth-signature-thoughts H. Tschofenig and B. Cook, \"Thoughts about Digital Signatures for the Open Web Authentication (OAuth) Protocol\", October 18, 2010, https:\/\/tools.ietf.org\/html\/draft-tschofenig-oauth-signature-thoughts"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2010.5676128"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1838574.1838590"},{"key":"e_1_3_2_1_29_1","unstructured":"OpenID Specifications http:\/\/openid.net\/developers\/specs\/  OpenID Specifications http:\/\/openid.net\/developers\/specs\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/514183.514185"},{"key":"e_1_3_2_1_31_1","volume-title":"IETF RFC 3820 (Standards Track)","author":"Tuecke S.","year":"2004","unstructured":"S. Tuecke , \" Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile \", IETF RFC 3820 (Standards Track) , June 2004 . S. Tuecke et al., \"Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile\", IETF RFC 3820 (Standards Track), June 2004."},{"key":"e_1_3_2_1_32_1","volume-title":"IETF RFC 5849 (Informational)","author":"Hammer-Lahav E.","year":"2010","unstructured":"E. Hammer-Lahav (ed.), \" The OAuth 1.0 Protocol \", IETF RFC 5849 (Informational) , April 2010 . E. Hammer-Lahav (ed.), \"The OAuth 1.0 Protocol\", IETF RFC 5849 (Informational), April 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2005.1542725"},{"key":"e_1_3_2_1_34_1","unstructured":"XSEDE Science Gateways https:\/\/www.xsede.org\/gateways  XSEDE Science Gateways https:\/\/www.xsede.org\/gateways"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1838574.1838597"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1750389.1750391"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v19:6"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1838574.1838576"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016741.2016776"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658260.1658271"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1488725.1488797"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.470"},{"key":"e_1_3_2_1_43_1","volume-title":"http:\/\/arstechnica.com\/security\/guides\/2010\/09\/twitter-a-case-study-on-how-to-do-oauth-wrong.ars (September 2","author":"Paul R.","year":"2010","unstructured":"R. Paul , \"Compromising Twitter's OAuth security system\" , http:\/\/arstechnica.com\/security\/guides\/2010\/09\/twitter-a-case-study-on-how-to-do-oauth-wrong.ars (September 2 , 2010 ). R. Paul, \"Compromising Twitter's OAuth security system\", http:\/\/arstechnica.com\/security\/guides\/2010\/09\/twitter-a-case-study-on-how-to-do-oauth-wrong.ars (September 2, 2010)."},{"key":"e_1_3_2_1_44_1","volume-title":"Modern Analytical Ultracentrifugation: Techniques and Methods","author":"Demeler B.","year":"2005","unstructured":"B. Demeler , \"UltraScan A Comprehensive Data Analysis Software Package for Analytical Ultracentrifugation Experiments\" , Modern Analytical Ultracentrifugation: Techniques and Methods , D. J. Scott, S.E. Harding and A.J. Rowe. Eds., Royal Society of Chemistry (UK) , 2005 . B. Demeler, \"UltraScan A Comprehensive Data Analysis Software Package for Analytical Ultracentrifugation Experiments\", Modern Analytical Ultracentrifugation: Techniques and Methods, D. J. Scott, S.E. Harding and A.J. Rowe. Eds., Royal Society of Chemistry (UK), 2005."},{"key":"e_1_3_2_1_45_1","unstructured":"UltraScan Reference and Application Database http:\/\/www.ultrascan.uthscsa.edu\/search-refs.html.  UltraScan Reference and Application Database http:\/\/www.ultrascan.uthscsa.edu\/search-refs.html."},{"key":"e_1_3_2_1_46_1","unstructured":"XML Metadata Concept Catalog (XMC Cat) http:\/\/pti.iu.edu\/d2i\/xmccat  XML Metadata Concept Catalog (XMC Cat) http:\/\/pti.iu.edu\/d2i\/xmccat"}],"event":{"name":"SC '11: International Conference for High Performance Computing, Networking, Storage and Analysis","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS"],"location":"Seattle Washington USA","acronym":"SC '11"},"container-title":["Proceedings of the 2011 ACM workshop on Gateway computing environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2110486.2110489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2110486.2110489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:10Z","timestamp":1750241170000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2110486.2110489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,18]]},"references-count":46,"alternative-id":["10.1145\/2110486.2110489","10.1145\/2110486"],"URL":"https:\/\/doi.org\/10.1145\/2110486.2110489","relation":{},"subject":[],"published":{"date-parts":[[2011,11,18]]},"assertion":[{"value":"2011-11-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}