{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:55Z","timestamp":1750220995781,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,26]],"date-time":"2020-07-26T00:00:00Z","timestamp":1595721600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1738962"],"award-info":[{"award-number":["1738962"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,26]]},"DOI":"10.1145\/3311790.3399613","type":"proceedings-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T04:34:20Z","timestamp":1595392460000},"page":"465-468","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments"],"prefix":"10.1145","author":[{"given":"You Alex","family":"Gao","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Jim","family":"Basney","sequence":"additional","affiliation":[{"name":"National Center for Supercomputing Applications, USA"}]},{"given":"Alex","family":"Withers","sequence":"additional","affiliation":[{"name":"National Center for Supercomputing Applications, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,7,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311790.3396658"},{"key":"#cr-split#-e_1_3_2_1_2_1.1","unstructured":"Mine Altunay Brian Bockelman Andrea Ceccanti Linda Cornwall Matt Crawford David Crooks Thomas Dack David Dykstra David Groep Ioannis Igoumenos Michel Jouvin Oliver Keeble David Kelsey Mario Lassnig Nicolas Liampotis Maarten Litmaath Andrew McNab Paul Millar Mischa Sall\u00e9 Hannah Short Jeny Teheran and Romain Wartel. 2019. WLCG Common JWT Profiles. https:\/\/doi.org\/10.5281\/zenodo.3460258 10.5281\/zenodo.3460258"},{"key":"#cr-split#-e_1_3_2_1_2_1.2","unstructured":"Mine Altunay Brian Bockelman Andrea Ceccanti Linda Cornwall Matt Crawford David Crooks Thomas Dack David Dykstra David Groep Ioannis Igoumenos Michel Jouvin Oliver Keeble David Kelsey Mario Lassnig Nicolas Liampotis Maarten Litmaath Andrew McNab Paul Millar Mischa Sall\u00e9 Hannah Short Jeny Teheran and Romain Wartel. 2019. WLCG Common JWT Profiles. https:\/\/doi.org\/10.5281\/zenodo.3460258"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","unstructured":"Brian Bockelman and Derek Weitzel. 2019. scitokens\/scitokens-cpp (Version v0.3.0). https:\/\/doi.org\/10.5281\/zenodo.2656677 10.5281\/zenodo.2656677"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","unstructured":"Brian Bockelman and Derek Weitzel. 2019. scitokens\/scitokens-cpp (Version v0.3.0). https:\/\/doi.org\/10.5281\/zenodo.2656677"},{"key":"e_1_3_2_1_4_1","volume-title":"McGloin, and P. Hunt","author":"Ed Lodderstedt","year":"2013","unstructured":"T.\u00a0 Lodderstedt ( Ed .), M. McGloin, and P. Hunt . 2013 . OAuth 2.0 Threat Model and Security Considerations. RFC 6819. https:\/\/doi.org\/10.17487\/RFC6819 10.17487\/RFC6819 T.\u00a0Lodderstedt (Ed.), M. McGloin, and P. Hunt. 2013. OAuth 2.0 Threat Model and Security Considerations. RFC 6819. https:\/\/doi.org\/10.17487\/RFC6819"},{"key":"#cr-split#-e_1_3_2_1_5_1.1","doi-asserted-by":"crossref","unstructured":"D. Hardt. 2012. The OAuth 2.0 Authorization Framework. RFC 6749. https:\/\/doi.org\/10.17487\/RFC6749 10.17487\/RFC6749","DOI":"10.17487\/rfc6749"},{"key":"#cr-split#-e_1_3_2_1_5_1.2","doi-asserted-by":"crossref","unstructured":"D. Hardt. 2012. The OAuth 2.0 Authorization Framework. RFC 6749. https:\/\/doi.org\/10.17487\/RFC6749","DOI":"10.17487\/rfc6749"},{"key":"#cr-split#-e_1_3_2_1_6_1.1","doi-asserted-by":"crossref","unstructured":"M. Jones J. Bradley and N. Sakimura. 2015. JSON Web Token (JWT). RFC 7519. https:\/\/doi.org\/10.17487\/RFC7519 10.17487\/RFC7519","DOI":"10.17487\/RFC7519"},{"key":"#cr-split#-e_1_3_2_1_6_1.2","doi-asserted-by":"crossref","unstructured":"M. Jones J. Bradley and N. Sakimura. 2015. JSON Web Token (JWT). RFC 7519. https:\/\/doi.org\/10.17487\/RFC7519","DOI":"10.17487\/RFC7519"},{"key":"e_1_3_2_1_7_1","volume":"201","author":"Jones M.","unstructured":"M. Jones , N. Sakimura , and J. Bradley. 201 8. OAuth 2.0 Authorization Server Metadata. RFC 8414. https:\/\/doi.org\/10.17487\/RFC8414 10.17487\/RFC8414 M. Jones, N. Sakimura, and J. Bradley. 2018. OAuth 2.0 Authorization Server Metadata. RFC 8414. https:\/\/doi.org\/10.17487\/RFC8414","journal-title":"J. Bradley."},{"key":"e_1_3_2_1_8_1","unstructured":"J. Richer. 201 10.17487\/RFC7662"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2016.7870901"},{"key":"#cr-split#-e_1_3_2_1_10_1.1","doi-asserted-by":"crossref","unstructured":"S. Tuecke V. Welch D. Engert L. Pearlman and M. Thompson. 2004. Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820. https:\/\/doi.org\/10.17487\/RFC3820 10.17487\/RFC3820","DOI":"10.17487\/rfc3820"},{"key":"#cr-split#-e_1_3_2_1_10_1.2","doi-asserted-by":"crossref","unstructured":"S. Tuecke V. Welch D. Engert L. Pearlman and M. Thompson. 2004. Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820. https:\/\/doi.org\/10.17487\/RFC3820","DOI":"10.17487\/rfc3820"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2003.1210015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219104.3219135"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332186.3333258"},{"key":"#cr-split#-e_1_3_2_1_14_1.1","doi-asserted-by":"crossref","unstructured":"T. Ylonen and C.\u00a0Lonvick (Ed.). 2006. The Secure Shell (SSH) Authentication Protocol. RFC 4252. https:\/\/doi.org\/10.17487\/RFC4252 10.17487\/RFC4252","DOI":"10.17487\/rfc4252"},{"key":"#cr-split#-e_1_3_2_1_14_1.2","doi-asserted-by":"crossref","unstructured":"T. Ylonen and C.\u00a0Lonvick (Ed.). 2006. The Secure Shell (SSH) Authentication Protocol. RFC 4252. https:\/\/doi.org\/10.17487\/RFC4252","DOI":"10.17487\/rfc4252"}],"event":{"name":"PEARC '20: Practice and Experience in Advanced Research Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"],"location":"Portland OR USA","acronym":"PEARC '20"},"container-title":["Practice and Experience in Advanced Research Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311790.3399613","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311790.3399613","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311790.3399613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:32Z","timestamp":1750206332000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311790.3399613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,26]]},"references-count":20,"alternative-id":["10.1145\/3311790.3399613","10.1145\/3311790"],"URL":"https:\/\/doi.org\/10.1145\/3311790.3399613","relation":{},"subject":[],"published":{"date-parts":[[2020,7,26]]},"assertion":[{"value":"2020-07-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}