{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:51Z","timestamp":1750220271995,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T00:00:00Z","timestamp":1657238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Fouondation","award":["1840003"],"award-info":[{"award-number":["1840003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,8]]},"DOI":"10.1145\/3491418.3535177","type":"proceedings-article","created":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T16:36:23Z","timestamp":1657298183000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Custos Secrets: a Service for Managing User-Provided Resource Credential Secrets for Science Gateways"],"prefix":"10.1145","author":[{"given":"Isuru","family":"Ranawaka","sequence":"first","affiliation":[{"name":"Indiana University, USA"}]},{"given":"Nuwan","family":"Goonasekara","sequence":"additional","affiliation":[{"name":"University of Melbourne, Australia"}]},{"given":"Enis","family":"Afgan","sequence":"additional","affiliation":[{"name":"Johns Hopkins University (JHU), USA"}]},{"given":"Jim","family":"Basney","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Suresh","family":"Marru","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, USA"}]},{"given":"Marlon","family":"Pierce","sequence":"additional","affiliation":[{"name":"Indiana University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CILogon: Enabling Federated Identity and Access Management for Scientific Collaborations. PoS ISGC2019(2019)","author":"Basney Jim","year":"2019","unstructured":"Jim Basney , Heather Flanagan , Terry Fleury , Jeff Gaynor , Scott Koranda , and Benn Oshrin . 2019 . CILogon: Enabling Federated Identity and Access Management for Scientific Collaborations. PoS ISGC2019(2019) , 031. https:\/\/doi.org\/10.22323\/1.351.0031 10.22323\/1.351.0031 Jim Basney, Heather Flanagan, Terry Fleury, Jeff Gaynor, Scott Koranda, and Benn Oshrin. 2019. CILogon: Enabling Federated Identity and Access Management for Scientific Collaborations. PoS ISGC2019(2019), 031. https:\/\/doi.org\/10.22323\/1.351.0031"},{"volume-title":"Introducing Azure Kubernetes Service","author":"Buchanan Steve","key":"e_1_3_2_1_2_1","unstructured":"Steve Buchanan , Janaka Rangama , and Ned Bellavance . 2020. Deploying and using Rancher with Azure Kubernetes service . In Introducing Azure Kubernetes Service . Springer , 79\u201399. Steve Buchanan, Janaka Rangama, and Ned Bellavance. 2020. Deploying and using Rancher with Azure Kubernetes service. In Introducing Azure Kubernetes Service. Springer, 79\u201399."},{"key":"e_1_3_2_1_3_1","unstructured":"CNCF. 2022. Helm. Retrieved April 8 2022 from https:\/\/helm.sh\/  CNCF. 2022. Helm. Retrieved April 8 2022 from https:\/\/helm.sh\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Custos. 2022. Python SDK. Retrieved April 8 2022 from https:\/\/cwiki.apache.org\/confluence\/display\/CUSTOS\/Use+Custos+Python+SDK  Custos. 2022. Python SDK. Retrieved April 8 2022 from https:\/\/cwiki.apache.org\/confluence\/display\/CUSTOS\/Use+Custos+Python+SDK"},{"key":"e_1_3_2_1_5_1","unstructured":"Custos. 2022. REST Endpoints. Retrieved April 8 2022 from https:\/\/cwiki.apache.org\/confluence\/display\/CUSTOS\/Use+Custos+REST+Endpoints  Custos. 2022. REST Endpoints. Retrieved April 8 2022 from https:\/\/cwiki.apache.org\/confluence\/display\/CUSTOS\/Use+Custos+REST+Endpoints"},{"key":"e_1_3_2_1_6_1","volume-title":"Secure Command Line Solution for Token-based Authentication. In EPJ Web of Conferences, Vol.\u00a0251","author":"Dykstra Dave","year":"2021","unstructured":"Dave Dykstra , Mine Altunay , and Jeny Teheran . 2021 . Secure Command Line Solution for Token-based Authentication. In EPJ Web of Conferences, Vol.\u00a0251 . EDP Sciences, EDP Sciences, France, 0 2036. https:\/\/doi.org\/10.1051\/epjconf\/202125102036 10.1051\/epjconf Dave Dykstra, Mine Altunay, and Jeny Teheran. 2021. Secure Command Line Solution for Token-based Authentication. In EPJ Web of Conferences, Vol.\u00a0251. EDP Sciences, EDP Sciences, France, 02036. https:\/\/doi.org\/10.1051\/epjconf\/202125102036"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"David\u00a0Y Hancock Jeremy Fischer John\u00a0Michael Lowe Winona Snapp-Childs Marlon Pierce Suresh Marru J\u00a0Eric Coulter Matthew Vaughn Brian Beck Nirav Merchant 2021. Jetstream2: Accelerating cloud computing via Jetstream. In Practice and Experience in Advanced Research Computing. 1\u20138.  David\u00a0Y Hancock Jeremy Fischer John\u00a0Michael Lowe Winona Snapp-Childs Marlon Pierce Suresh Marru J\u00a0Eric Coulter Matthew Vaughn Brian Beck Nirav Merchant 2021. Jetstream2: Accelerating cloud computing via Jetstream. In Practice and Experience in Advanced Research Computing. 1\u20138.","DOI":"10.1145\/3437359.3465565"},{"key":"e_1_3_2_1_8_1","volume-title":"W1","author":"Jalili Vahid","year":"2020","unstructured":"Vahid Jalili , Enis Afgan , Qiang Gu , Dave Clements , Daniel Blankenberg , Jeremy Goecks , James Taylor , and Anton Nekrutenko . 2020. The Galaxy platform for accessible, reproducible and collaborative biomedical analyses: 2020 update. Nucleic acids research 48 , W1 ( 2020 ), W395\u2013W402. Vahid Jalili, Enis Afgan, Qiang Gu, Dave Clements, Daniel Blankenberg, Jeremy Goecks, James Taylor, and Anton Nekrutenko. 2020. The Galaxy platform for accessible, reproducible and collaborative biomedical analyses: 2020 update. Nucleic acids research 48, W1 (2020), W395\u2013W402."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3526"},{"key":"e_1_3_2_1_10_1","volume-title":"Science Gateway Integration Examples with the Custos Security Service. In 8th International Workshop on HPC User Support Tools (HUST). Zenodo, 9\u00a0pages. https:\/\/doi.org\/10","author":"Ranawaka Isuru","year":"2021","unstructured":"Isuru Ranawaka , Samitha Liyanage , Dannon Baker , Alexandru Mahmoud , Juleen Graham , Terry Fleury , Dimuthu Wannipurage , Yu Ma , Enis Afgan , Jim Basney , Suresh Marru , and Marlon Pierce . 2021 . Science Gateway Integration Examples with the Custos Security Service. In 8th International Workshop on HPC User Support Tools (HUST). Zenodo, 9\u00a0pages. https:\/\/doi.org\/10 .5281\/zenodo.5749727 10.5281\/zenodo.5749727 Isuru Ranawaka, Samitha Liyanage, Dannon Baker, Alexandru Mahmoud, Juleen Graham, Terry Fleury, Dimuthu Wannipurage, Yu Ma, Enis Afgan, Jim Basney, Suresh Marru, and Marlon Pierce. 2021. Science Gateway Integration Examples with the Custos Security Service. In 8th International Workshop on HPC User Support Tools (HUST). Zenodo, 9\u00a0pages. https:\/\/doi.org\/10.5281\/zenodo.5749727"},{"key":"e_1_3_2_1_11_1","volume-title":"Custos: Security middleware for science gateways. In Practice and Experience in Advanced Research Computing. 278\u2013284. https:\/\/doi.org\/10.1145\/3311790.3396635","author":"Ranawaka Isuru","year":"2020","unstructured":"Isuru Ranawaka , Suresh Marru , Juleen Graham , Aarushi Bisht , Jim Basney , Terry Fleury , Jeff Gaynor , Dimuthu Wannipurage , Marcus Christie , Alexandru Mahmoud , 2020 . Custos: Security middleware for science gateways. In Practice and Experience in Advanced Research Computing. 278\u2013284. https:\/\/doi.org\/10.1145\/3311790.3396635 10.1145\/3311790.3396635 Isuru Ranawaka, Suresh Marru, Juleen Graham, Aarushi Bisht, Jim Basney, Terry Fleury, Jeff Gaynor, Dimuthu Wannipurage, Marcus Christie, Alexandru Mahmoud, 2020. Custos: Security middleware for science gateways. In Practice and Experience in Advanced Research Computing. 278\u2013284. https:\/\/doi.org\/10.1145\/3311790.3396635"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219104.3219135"}],"event":{"name":"PEARC '22: Practice and Experience in Advanced Research Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"],"location":"Boston MA USA","acronym":"PEARC '22"},"container-title":["Practice and Experience in Advanced Research Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491418.3535177","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491418.3535177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:06Z","timestamp":1750188666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491418.3535177"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,8]]},"references-count":12,"alternative-id":["10.1145\/3491418.3535177","10.1145\/3491418"],"URL":"https:\/\/doi.org\/10.1145\/3491418.3535177","relation":{},"subject":[],"published":{"date-parts":[[2022,7,8]]},"assertion":[{"value":"2022-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}