Von Welch

Orcid: 0000-0002-5896-7789

According to our database1, Von Welch authored at least 53 papers between 2000 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Reproducing GW150914: the first observation of gravitational waves from a binary black hole merger.
Dataset, May, 2022

2021
Reproducing GW150914: The First Observation of Gravitational Waves From a Binary Black Hole Merger.
Comput. Sci. Eng., 2021

Root Cause Analysis of Data Integrity Errors in Networked Systems with Incomplete Information.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2020
Reproducing GW150914: the first observation of gravitational waves from a binary black hole merger.
CoRR, 2020

2019
Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences.
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019

Trusted CI Experiences in Cybersecurity and Service to Open Science.
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019

Initial Thoughts on Cybersecurity And Reproducibility.
Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2019

Applicability Study of the PRIMAD Model to LIGO Gravitational Wave Search Workflows.
Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2019

2017
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity.
IEEE Secur. Priv., 2017

2015
Sustained Software for Cyberinfrastructure: Analyses of Successful Efforts with a Focus on NSF-funded Software.
Proceedings of the 1st Workshop on The Science of Cyberinfrastructure, 2015

Authentication and Authorization Considerations for a Multi-tenant Service.
Proceedings of the 1st Workshop on The Science of Cyberinfrastructure, 2015

Facilitating Scientific Collaborations by Delegating Identity Management: Reducing Barriers & Roadmap for Incremental Implementation.
Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, 2015

2013
Initial Findings from a Study of Best Practices and Models for Cyberinfrastructure Software Sustainability.
CoRR, 2013

Toward a Research Software Security Maturity Model.
CoRR, 2013

Identity Management for Virtual Organizations: An Experience-Based Model.
Proceedings of the 9th IEEE International Conference on eScience, 2013

Science gateway security recommendations.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2011
A roadmap for using NSF cyberinfrastructure with InCommon.
Proceedings of the 2011 TeraGrid Conference - Extreme Digital Discovery, 2011

Cyberinfrastructure Usage Modalities on the TeraGrid.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

2010
TeraGrid Science Gateway AAAA Model: implementation and lessons learned.
Proceedings of the 2010 TeraGrid Conference, 2010

Federated login to TeraGrid.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

2009
Interoperation of world-wide production e-Science infrastructures.
Concurr. Comput. Pract. Exp., 2009

Palantir: a framework for collaborative incident response and investigation.
Proceedings of the IDtrust 2009, 2009

2008
The Traust Authorization Service.
ACM Trans. Inf. Syst. Secur., 2008

Towards A Taxonomy Of Attacks Against Energy Control Systems.
Proceedings of the Critical Infrastructure Protection II, 2008

Observatory Middleware Framework.
Proceedings of the Fourth International Conference on e-Science, 2008

2007
A AAAA model to support science gateways with community accounts.
Concurr. Comput. Pract. Exp., 2007

Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment.
Clust. Comput., 2007

Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol.
RFC, May, 2006

Single sign-on for java web start applications using myproxy.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Mithril: Adaptable Security for Survivability in Collaborative Computing Sites.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Traust: a trust negotiation-based authorization service for open systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Traust: A Trust Negotiation Based Authorization Service.
Proceedings of the Trust Management, 4th International Conference, 2006

TeraGrid: Analysis of Organization, System Architecture, and Middleware Enabling New Types of Applications.
Proceedings of the High Performance Computing and Grids in Action, 2006

Operational Security Requirements for Large Collaborative Compute Infrastructures.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
The MyProxy online credential repository.
Softw. Pract. Exp., 2005

Mechanisms for increasing the usability of grid security.
Int. J. Hum. Comput. Stud., 2005

Negotiating Trust on the Grid.
Proceedings of the Semantic Grid: The Convergence of Technologies, 3.-8. July 2005, 2005

2004
Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile.
RFC, June, 2004

Fine-grained authorization for job execution in the Grid: design and implementation.
Concurr. Pract. Exp., 2004

Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.
Proceedings of the Communications and Multimedia Security, 2004

Security for Virtual Organizations.
Proceedings of the Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition, 2004

2003
The Community Authorization Service: Status and Future
CoRR, 2003

Fine-Grained Authorization for Job and Resource Management Using Akenti and the Globus Toolkit
CoRR, 2003

Using CAS to Manage Role-Based VO Sub-Groups
CoRR, 2003

Fine-Grain Authorization Policies in the GRID: Design and Implementation.
Proceedings of the International Middleware Conference, 2003

Security for Grid Services.
Proceedings of the 12th International Symposium on High-Performance Distributed Computing (HPDC-12 2003), 2003

2002
A Community Authorization Service for Group Collaboration.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Security and Certification Issues in Grid Computing.
Proceedings of the Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17<sup>th</sup> World Computer Congress, 2002

An Authorization Framework for a Grid Based Component Architecture.
Proceedings of the Grid Computing, 2002

Fine-Grain Authorization for Resource Management in the Grid Environment.
Proceedings of the Grid Computing, 2002

2001
An Online Credential Repository for the Grid: MyProxy.
Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing (HPDC-10 2001), 2001

2000
A National-Scale Authentication Infrastructur.
Computer, 2000


  Loading...