default search action
Von Welch
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [d1]Duncan A. Brown, Karan Vahi, Michela Taufer, Von Welch, Ewa Deelman:
Reproducing GW150914: the first observation of gravitational waves from a binary black hole merger. IEEE DataPort, 2022 - 2021
- [j10]Duncan A. Brown, Karan Vahi, Michela Taufer, Von Welch, Ewa Deelman, Lorena A. Barba, George K. Thiruvathukal:
Reproducing GW150914: The First Observation of Gravitational Waves From a Binary Black Hole Merger. Comput. Sci. Eng. 23(2): 73-82 (2021) - [c33]Yufeng Xin, Shih-Wen Fu, Anirban Mandal, Ilya Baldin, Ryan Tanaka, Mats Rynge, Karan Vahi, Ewa Deelman, Ishan Abhinit, Von Welch:
Root Cause Analysis of Data Integrity Errors in Networked Systems with Incomplete Information. ICTC 2021: 735-740 - 2020
- [i15]Duncan A. Brown, Karan Vahi, Michela Taufer, Von Welch, Ewa Deelman:
Reproducing GW150914: the first observation of gravitational waves from a binary black hole merger. CoRR abs/2010.07244 (2020)
2010 – 2019
- 2019
- [c32]Dylan Chapp, Danny Rorabaugh, Duncan A. Brown, Ewa Deelman, Karan Vahi, Von Welch, Michela Taufer:
Applicability Study of the PRIMAD Model to LIGO Gravitational Wave Search Workflows. P-RECS@HPDC 2019: 1-6 - [c31]Ewa Deelman, Victoria Stodden, Michela Taufer, Von Welch:
Initial Thoughts on Cybersecurity And Reproducibility. P-RECS@HPDC 2019: 13-15 - [c30]Mats Rynge, Karan Vahi, Ewa Deelman, Anirban Mandal, Ilya Baldin, Omkar Bhide, Randy W. Heiland, Von Welch, Raquel Hill, William L. Poehlman, F. Alex Feltus:
Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences. PEARC 2019: 17:1-17:8 - [c29]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. PEARC 2019: 60 - [i14]Dylan Chapp, Danny Rorabaugh, Duncan A. Brown, Ewa Deelman, Karan Vahi, Von Welch, Michela Taufer:
Applicability study of the PRIMAD model to LIGO gravitational wave search workflows. CoRR abs/1904.05211 (2019) - [i13]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. CoRR abs/1904.05383 (2019) - 2017
- [j9]Sean Peisert, Von Welch:
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity. IEEE Secur. Priv. 15(5): 94-95 (2017) - 2015
- [c28]Robert Cowles, Craig Jackson, Von Welch:
Facilitating Scientific Collaborations by Delegating Identity Management: Reducing Barriers & Roadmap for Incremental Implementation. CLHS@HPDC 2015: 15-19 - [c27]Randy W. Heiland, Scott Koranda, Suresh Marru, Marlon E. Pierce, Von Welch:
Authentication and Authorization Considerations for a Multi-tenant Service. SCREAM@HPDC 2015: 29-35 - [c26]Craig A. Stewart, William K. Barnett, Eric A. Wernert, Julie A. Wernert, Von Welch, Richard Knepper:
Sustained Software for Cyberinfrastructure: Analyses of Successful Efforts with a Focus on NSF-funded Software. SCREAM@HPDC 2015: 63-72 - 2013
- [c25]Jim Basney, Von Welch:
Science gateway security recommendations. CLUSTER 2013: 1-3 - [c24]Robert Cowles, Craig Jackson, Von Welch:
Identity Management for Virtual Organizations: An Experience-Based Model. e-Science 2013: 278-284 - [i12]Randy W. Heiland, Betsy Thomas, Von Welch, Craig Jackson:
Toward a Research Software Security Maturity Model. CoRR abs/1309.1677 (2013) - [i11]Craig A. Stewart, Julie Wernert, Eric A. Wernert, William K. Barnett, Von Welch:
Initial Findings from a Study of Best Practices and Models for Cyberinfrastructure Software Sustainability. CoRR abs/1309.1817 (2013) - 2011
- [c23]Daniel S. Katz, David L. Hart, Chris Jordan, Amitava Majumdar, John-Paul Navarro, Warren Smith, John Towns, Von Welch, Nancy Wilkins-Diehr:
Cyberinfrastructure Usage Modalities on the TeraGrid. IPDPS Workshops 2011: 932-939 - [c22]Von Welch, Alan Walsh, William K. Barnett, Craig A. Stewart:
A roadmap for using NSF cyberinfrastructure with InCommon. TG 2011: 28:1-28:2 - 2010
- [c21]Jim Basney, Terry Fleury, Von Welch:
Federated login to TeraGrid. IDtrust 2010: 1-11 - [c20]Jim Basney, Von Welch, Nancy Wilkins-Diehr:
TeraGrid Science Gateway AAAA Model: implementation and lessons learned. TG 2010: 2:1-2:6
2000 – 2009
- 2009
- [j8]Morris Riedel, Erwin Laure, Thomas Soddemann, Laurence Field, John-Paul Navarro, James Casey, Maarten Litmaath, Jean-Philippe Baud, Birger Koblitz, Charlie Catlett, Dane Skow, Cindy Zheng, Philip M. Papadopoulos, Mason J. Katz, Neha Sharma, Oxana Smirnova, Balázs Kónya, Peter W. Arzberger, Frank Würthwein, Abhishek Singh Rana, Terrence Martin, M. Wan, Von Welch, Tony Rimovsky, Steven J. Newhouse, Andrea Vanni, Yoshio Tanaka, Yusuke Tanimura, Tsutomu Ikegami, David Abramson, Colin Enticott, Graham Jenkins, Ruth Pordes, Steven Timm, Gidon Moont, Mona Aggarwal, D. Colling, Olivier van der Aa, Alex Sim, Vijaya Natarajan, Arie Shoshani, Junmin Gu, S. Chen, Gerson Galang, Riccardo Zappi, Luca Magnoni, Vincenzo Ciaschini, Michele Pace, Valerio Venturi, Moreno Marzolla, Paolo Andreetto, Robert Cowles, Shaowen Wang, Yuji Saeki, Hitoshi Sato, Satoshi Matsuoka, Putchong Uthayopas, Somsak Sriprayoonsakul, Oscar Koeroo, Matthew Viljoen, Laura Pearlman, Stephen Pickles, David Wallom, Glenn Moloney, Jerome Lauret, Jim Marsteller, Paul Sheldon, Surya Pathak, Shaun De Witt, Jirí Mencák, Jens Jensen, Matt Hodges, Derek Ross, Sugree Phatanapherom, Gilbert Netzer, Anders Rhod Gregersen, Mike Jones, S. Chen, Péter Kacsuk, Achim Streit, Daniel Mallmann, Felix Wolf, Thomas Lippert, Thierry Delaitre, Eduardo Huedo, Neil Geddes:
Interoperation of world-wide production e-Science infrastructures. Concurr. Comput. Pract. Exp. 21(8): 961-990 (2009) - [c19]Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Michael Freemon, Von Welch, Randy Butler:
Palantir: a framework for collaborative incident response and investigation. IDtrust 2009: 38-51 - 2008
- [j7]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
The Traust Authorization Service. ACM Trans. Inf. Syst. Secur. 11(1): 2:1-2:33 (2008) - [c18]Randal Butler, Terry Fleury, Von Welch, John Graybeal, Duane Edgington, Kevin Gomes, Bob Herlien:
Observatory Middleware Framework. eScience 2008: 366-367 - [c17]Terry Fleury, Himanshu Khurana, Von Welch:
Towards A Taxonomy Of Attacks Against Energy Control Systems. Critical Infrastructure Protection 2008: 71-85 - 2007
- [j6]Randy Butler, Mark Servilla, Stuart Gage, Jim Basney, Von Welch, Bill Baker, Terry Fleury, Patrick Duda, David Gehrig, Michael Bletzinger, Jing Tao, D. Michael Freemon:
Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment. Clust. Comput. 10(3): 301-310 (2007) - [j5]Von Welch, Jim Barlow, Jim Basney, Doru Marcusiu, Nancy Wilkins-Diehr:
A AAAA model to support science gateways with community accounts. Concurr. Comput. Pract. Exp. 19(6): 893-904 (2007) - [c16]Himanshu Khurana, Mohammad Maifi Hasan Khan, Von Welch:
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid. HICSS 2007: 115 - 2006
- [c15]Randy Butler, Mark Servilla, Stuart Gage, Jim Basney, Von Welch, Bill Baker, Terry Fleury, Patrick Duda, David Gehrig, Michael Bletzinger, Jing Tao, D. Michael Freemon:
CyberInfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment. CLADE 2006: 25-33 - [c14]Himanshu Khurana, Jim Basney, Von Welch, Roy H. Campbell:
Operational Security Requirements for Large Collaborative Compute Infrastructures. CollaborateCom 2006 - [c13]Charlie Catlett, William E. Allcock, Phil Andrews, Ruth A. Aydt, Ray Bair, Natasha Balac, Bryan Banister, Trish Barker, Mark Bartelt, Peter H. Beckman, Francine Berman, Gary R. Bertoline, Alan Blatecky, Jay Boisseau, Jim Bottum, Sharon Brunett, Julian J. Bunn, Michelle Butler, David Carver, John Cobb, Tim Cockerill, Peter Couvares, Maytal Dahan, Diana Diehl, Thom H. Dunning, Ian T. Foster, Kelly P. Gaither, Dennis Gannon, Sebastien Goasguen, Michael Grobe, David L. Hart, Matt Heinzel, Chris Hempel, Wendy Huntoon, Joseph A. Insley, Christopher T. Jordan, Ivan R. Judson, Anke Kamrath, Nicholas T. Karonis, Carl Kesselman, Patricia A. Kovatch, Lex Lane, Scott A. Lathrop, Michael J. Levine, David Lifka, Lee Liming, Miron Livny, Rich Loft, Doru Marcusiu, Jim Marsteller, Stuart Martin, D. Scott McCaulay, John McGee, Laura McGinnis, Michael A. McRobbie, Paul Messina, Reagan W. Moore, Richard Lee Moore, John-Paul Navarro, Jeff Nichols, Michael E. Papka, Rob Pennington, Greg Pike, Jim Pool, Raghurama Reddy, Daniel A. Reed, Tony Rimovsky, Eric Roberts, Ralph Roskies, Sergiu Sanielevici, J. Ray Scott, Anurag Shankar, Mark Sheddon, Mike Showerman, Derek Simmel, Abe Singer, Dane Skow, Shava Smallen, Warren Smith, Carol X. Song, Rick L. Stevens, Craig A. Stewart, Robert B. Stock, Nathan Stone, John Towns, Tomislav Urban, Mike Vildibill, Edward Walker, Von Welch, Nancy Wilkins-Diehr, Roy Williams, Linda Winkler, Lan Zhao, Ann Zimmerman:
TeraGrid: Analysis of Organization, System Architecture, and Middleware Enabling New Types of Applications. High Performance Computing Workshop 2006: 225-249 - [c12]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: A Trust Negotiation Based Authorization Service. iTrust 2006: 458-462 - [c11]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: a trust negotiation-based authorization service for open systems. SACMAT 2006: 39-48 - [c10]Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch:
Mithril: Adaptable Security for Survivability in Collaborative Computing Sites. SecureComm 2006: 1-7 - [c9]Terry Fleury, Jim Basney, Von Welch:
Single sign-on for java web start applications using myproxy. SWS 2006: 95-102 - [i10]Jeffrey Hutzelman, Joseph Salowey, Joseph Galbraith, Von Welch:
Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol. RFC 4462: 1-29 (2006) - 2005
- [j4]Bruce Beckles, Von Welch, Jim Basney:
Mechanisms for increasing the usability of grid security. Int. J. Hum. Comput. Stud. 63(1-2): 74-101 (2005) - [j3]Jim Basney, Marty Humphrey, Von Welch:
The MyProxy online credential repository. Softw. Pract. Exp. 35(9): 801-816 (2005) - [i9]Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, Marianne Winslett:
Negotiating Trust on the Grid. Semantic Grid 2005 - 2004
- [j2]Katarzyna Keahey, Von Welch, Sam Lang, B. Liu, Sam Meder:
Fine-grained authorization for job execution in the Grid: design and implementation. Concurr. Pract. Exp. 16(5): 477-488 (2004) - [c8]David W. Chadwick, Sassa Otenko, Von Welch:
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure. Communications and Multimedia Security 2004: 251-261 - [p1]Frank Siebenlist, Nataraj Nagaratnam, Von Welch, Clifford Neuman:
Security for Virtual Organizations. The Grid 2, 2nd Edition 2004: 353-387 - [i8]Steven Tuecke, Von Welch, Douglas Engert, Laura Pearlman, Mary R. Thompson:
Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820: 1-37 (2004) - 2003
- [c7]Von Welch, Frank Siebenlist, Ian T. Foster, John Bresnahan, Karl Czajkowski, Jarek Gawor, Carl Kesselman, Sam Meder, Laura Pearlman, Steven Tuecke:
Security for Grid Services. HPDC 2003: 48-57 - [c6]Katarzyna Keahey, Von Welch, Sam Lang, B. Liu, Sam Meder:
Fine-Grain Authorization Policies in the GRID: Design and Implementation. Middleware Workshops 2003: 170-177 - [i7]Katarzyna Keahey, Von Welch:
Fine-Grain Authorization for Resource Management in the Grid Environment. CoRR cs.CR/0301031 (2003) - [i6]Craig E. Tull, Shane Canon, Steve Chan, Doug Olson, Laura Pearlman, Von Welch:
Using CAS to Manage Role-Based VO Sub-Groups. CoRR cs.CR/0306088 (2003) - [i5]Von Welch, Frank Siebenlist, Ian T. Foster, John Bresnahan, Karl Czajkowski, Jarek Gawor, Carl Kesselman, Sam Meder, Laura Pearlman, Steven Tuecke:
Security for Grid Services. CoRR cs.CR/0306129 (2003) - [i4]Katarzyna Keahey, Von Welch, Sam Lang, B. Liu, Sam Meder:
Fine-Grained Authorization for Job Execution in the Grid: Design and Implementation. CoRR cs.CR/0311025 (2003) - [i3]Laura Pearlman, Von Welch, Ian T. Foster, Carl Kesselman, Steven Tuecke:
A Community Authorization Service for Group Collaboration. CoRR cs.DC/0306053 (2003) - [i2]Mary R. Thompson, Abdelilah Essiari, Katarzyna Keahey, Von Welch, Sam Lang, B. Liu:
Fine-Grained Authorization for Job and Resource Management Using Akenti and the Globus Toolkit. CoRR cs.DC/0306070 (2003) - [i1]Laura Pearlman, Von Welch, Ian T. Foster, Carl Kesselman, Steven Tuecke:
The Community Authorization Service: Status and Future. CoRR cs.SE/0306082 (2003) - 2002
- [c5]Lavanya Ramakrishnan, Helen Rehn, Jay Alameda, Rachana Ananthakrishnan, Madhusudhan Govindaraju, Aleksander Slominski, Kay Connelly, Von Welch, Dennis Gannon, Randall Bramley, Shawn D. Hampton:
An Authorization Framework for a Grid Based Component Architecture. GRID 2002: 169-180 - [c4]Katarzyna Keahey, Von Welch:
Fine-Grain Authorization for Resource Management in the Grid Environment. GRID 2002: 199-206 - [c3]Ian T. Foster, Frank Siebenlist, Steven Tuecke, Von Welch:
Security and Certification Issues in Grid Computing. Certification and Security in E-Services 2002: 47-55 - [c2]Laura Pearlman, Von Welch, Ian T. Foster, Carl Kesselman, Steven Tuecke:
A Community Authorization Service for Group Collaboration. POLICY 2002: 50-59 - 2001
- [c1]Jason Novotny, Steven Tuecke, Von Welch:
An Online Credential Repository for the Grid: MyProxy. HPDC 2001: 104- - 2000
- [j1]Randy Butler, Von Welch, Douglas Engert, Ian T. Foster, Steven Tuecke, John Volmer, Carl Kesselman:
A National-Scale Authentication Infrastructur. Computer 33(12): 60-66 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint