{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:11Z","timestamp":1759132031250,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,7,22]],"date-time":"2013-07-22T00:00:00Z","timestamp":1374451200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-SC0008597"],"award-info":[{"award-number":["DE-SC0008597"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["943633"],"award-info":[{"award-number":["943633"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,7,22]]},"DOI":"10.1145\/2484762.2484791","type":"proceedings-article","created":{"date-parts":[[2013,7,30]],"date-time":"2013-07-30T13:40:50Z","timestamp":1375191650000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["CILogon"],"prefix":"10.1145","author":[{"given":"Jim","family":"Basney","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois"}]},{"given":"Terry","family":"Fleury","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois"}]},{"given":"Jeff","family":"Gaynor","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois"}]}],"member":"320","published-online":{"date-parts":[[2013,7,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Daan Broeder Bob Jones David Kelsey Philip Kershaw Stefan L\u00fcders Andrew Lyall Tommi Nyr\u00f6nen Romain Wartel and Heinz Weyer \"Federated Identity Management for Research Collaborations\" April 2012. https:\/\/cdsweb.cern.ch\/record\/1442597  Daan Broeder Bob Jones David Kelsey Philip Kershaw Stefan L\u00fcders Andrew Lyall Tommi Nyr\u00f6nen Romain Wartel and Heinz Weyer \"Federated Identity Management for Research Collaborations\" April 2012. https:\/\/cdsweb.cern.ch\/record\/1442597"},{"key":"e_1_3_2_1_2_1","volume-title":"IETF RFC 5849 (Informational)","author":"Hammer-Lahav E.","year":"2010","unstructured":"E. Hammer-Lahav (ed.), \" The OAuth 1.0 Protocol \", IETF RFC 5849 (Informational) , April 2010 . E. Hammer-Lahav (ed.), \"The OAuth 1.0 Protocol\", IETF RFC 5849 (Informational), April 2010."},{"key":"e_1_3_2_1_3_1","first-page":"2","volume":"1","author":"Identity Federal","year":"2009","unstructured":"Federal Identity , Credentialing, and Access Management: Trust Framework Provider Adoption Process (TFPAP) For Levels of Assurance 1 , 2 , and Non-PKI 3, September 2009 . http:\/\/www.idmanagement.gov\/documents\/TrustFrameworkProviderAdoptionProcess.pdf Federal Identity, Credentialing, and Access Management: Trust Framework Provider Adoption Process (TFPAP) For Levels of Assurance 1, 2, and Non-PKI 3, September 2009. http:\/\/www.idmanagement.gov\/documents\/TrustFrameworkProviderAdoptionProcess.pdf","journal-title":"For Levels of Assurance"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016741.2016776"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1750389.1750391"},{"key":"e_1_3_2_1_6_1","unstructured":"Jim Basney Scott Koranda and Von Welch \"An Analysis of the Benefits and Risks to LIGO When Participating in Identity Federations \" LIGO document number LIGO-G1100964-v2 September 2011. https:\/\/dcc.ligo.org\/public\/0070\/G1100964\/002\/LIGOIdentityFederationRiskAnalysis.pdf  Jim Basney Scott Koranda and Von Welch \"An Analysis of the Benefits and Risks to LIGO When Participating in Identity Federations \" LIGO document number LIGO-G1100964-v2 September 2011. https:\/\/dcc.ligo.org\/public\/0070\/G1100964\/002\/LIGOIdentityFederationRiskAnalysis.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110486.2110489"},{"key":"e_1_3_2_1_8_1","unstructured":"Tom Barton Jim Basney Tim Freeman Tom Scavo Frank Siebenlist Von Welch Rachana Ananthakrishnan Bill Baker Monte Goode and Kate Keahey \"Identity Federation and Attribute-based Authorization through the Globus Toolkit Shibboleth Gridshib and MyProxy \" 5th Annual PKI R&D Workshop April 2006. http:\/\/middleware.internet2.edu\/pki06\/proceedings  Tom Barton Jim Basney Tim Freeman Tom Scavo Frank Siebenlist Von Welch Rachana Ananthakrishnan Bill Baker Monte Goode and Kate Keahey \"Identity Federation and Attribute-based Authorization through the Globus Toolkit Shibboleth Gridshib and MyProxy \" 5th Annual PKI R&D Workshop April 2006. http:\/\/middleware.internet2.edu\/pki06\/proceedings"},{"key":"e_1_3_2_1_9_1","unstructured":"William Barnett Von Welch Alan Walsh and Craig Stewart \"A Roadmap for Using NSF Cyberinfrastructure with InCommon \" March 2011. http:\/\/hdl.handle.net\/2022\/13024  William Barnett Von Welch Alan Walsh and Craig Stewart \"A Roadmap for Using NSF Cyberinfrastructure with InCommon \" March 2011. http:\/\/hdl.handle.net\/2022\/13024"}],"event":{"name":"XSEDE '13: Extreme Science and Engineering Discovery Environment: Gateway to Discovery","acronym":"XSEDE '13","location":"San Diego California USA"},"container-title":["Proceedings of the Conference on Extreme Science and Engineering Discovery Environment: Gateway to Discovery"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484762.2484791","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484762.2484791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:52Z","timestamp":1750235752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484762.2484791"}},"subtitle":["a federated X.509 certification authority for cyberinfrastructure logon"],"short-title":[],"issued":{"date-parts":[[2013,7,22]]},"references-count":9,"alternative-id":["10.1145\/2484762.2484791","10.1145\/2484762"],"URL":"https:\/\/doi.org\/10.1145\/2484762.2484791","relation":{},"subject":[],"published":{"date-parts":[[2013,7,22]]},"assertion":[{"value":"2013-07-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}