Principal Research Scientist
Cybersecurity
National Center for Supercomputing Applications
University of Illinois at Urbana-Champaign

Email: jbasney@illinois.edu
GitHub: jbasney
ORCID: https://orcid.org/0000-0002-0139-0640

Current Projects

Publications

Please contact me for a free copy of any publication listed below.

  • M. J. H. Faruk, J. Basney and J. Q. Cheng, "Blockchain-Based Decentralized Verifiable Credentials: Leveraging Smart Contracts for Privacy-Preserving Authentication Mechanisms to Enhance Data Security in Scientific Data Access," 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, 2023, pp. 5493-5502, doi: 10.1109/BigData59044.2023.10386360. https://doi.org/mdnq
  • Md Jobair Hossain Faruk, Bilash Saha, and Jim Basney. 2023. A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data. In Practice and Experience in Advanced Research Computing (PEARC ’23), July 23–27, 2023, Portland, OR, USA. ACM, New York, NY, USA, 302–305. https://doi.org/ksxt
  • Suresh Marru, Marlon Pierce, Beth Plale, Sudhakar Pamidighantam, Dimuthu Wannipurage, Marcus Christie, Isuru Ranawaka, Eroma Abeysinghe, Rob Quick, Emad Tajkhorshid, Seid Koric, Jim Basney, Mariano Spivak, Barry Isralewitz, Rafael Bernardi, Diego Gomes, Giri Krishnan, Maxim Bazhenov, Shava Smallen, Amit Majumdar, Anton Arkhipov, Kael Dai and Xiao-Ping Liu. 2023. Cybershuttle: An end-to-end Cyberinfrastructure Continuum to accelerate Discovery in Science and Engineering. In Practice and Experience in Advanced Research Computing (PEARC ’23), July 23–27, 2023, Portland, OR, USA. ACM, New York, NY, USA, 26–34. https://doi.org/ksxw
  • Md Arifuzzaman, Brian Bockelman, Jim Basney, and Engin Arslan. Falcon: Fair and Efficient Online File Transfer Optimization. IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 34, no. 8, pp. 2265-2278, August 2023. https://doi.org/kdps
  • Brian Aydemir, Jim Basney, Brian Bockelman, Jeff Gaynor and Derek Weitzel. 2022. SciAuth: A Lightweight End-to-End Capability-Based Authorization Environment for Scientific Computing. In Practice and Experience in Advanced Research Computing (PEARC '22), July 10–14, 2022, Boston, MA, USA. ACM, New York, NY, USA. https://doi.org/h6g4 [pdf]
  • Isuru Ranawaka, Nuwan Goonasekara, Enis Afgan, Jim Basney, Suresh Marru and Marlon Pierce. 2022. Custos Secrets: a Service for Managing User-Provided Resource Credential Secrets for Science Gateways. In Practice and Experience in Advanced Research Computing (PEARC '22), July 10–14, 2022, Boston, MA, USA. ACM, New York, NY, USA. https://doi.org/h82x
  • Isuru Ranawaka, Samitha Liyanage, Dannon Baker, Alexandru Mahmoud, Juleen Graham, Terry Fleury, Dimuthu Wannipurage, Yu Ma, Enis Afgan, Jim Basney, Suresh Marru, and Marlon Pierce. 2021. Science Gateway Integration Examples with the Custos Security Service. 8th International Workshop on HPC User Support Tools (HUST), November 2021. https://doi.org/h82z
  • Jim Basney, Phuong Cao, and Terry Fleury, "Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory," IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications (DependSys), December 2020. https://doi.org/h822 [data]
  • Isuru Ranawaka, Suresh Marru, Juleen Graham, Aarushi Bisht, Jim Basney, Terry Fleury, Jeff Gaynor, Dimuthu Wannipurage, Marcus Christie, Alexandru Mahmoud, Enis Afgan, and Marlon Pierce. 2020. Custos: Security Middleware for Science Gateways. In Practice and Experience in Advanced Research Computing (PEARC '20), July 26–30, 2020, Portland, OR, USA. ACM, New York, NY, USA, 13 pages. https://doi.org/h823
  • You Alex Gao, Jim Basney, and Alex Withers. 2020. SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments. In Practice and Experience in Advanced Research Computing (PEARC ’20), July 26-30, 2020, Portland, OR, USA. ACM, New York, NY, USA, 7 pages. https://doi.org/h824
  • Lee Liming, Jim Basney, John Paul Navarro, and Shava Smallen. 2020. Use Case Methodology in XSEDE System Integration. In Practice and Experience in Advanced Research Computing (PEARC ’20), July 26–30, 2020, Portland, OR, USA. ACM, New York, NY, USA, 7 pages. https://doi.org/h9xz
  • Jim Basney, Heather Flanagan, Terry Fleury, Jeff Gaynor, Scott Koranda, and Benn Oshrin. CILogon: Enabling Federated Identity and Access Management for Scientific Collaborations. In Proceedings of the International Symposium on Grids and Clouds (ISGC), PoS(ISGC2019)031, 2019. https://doi.org/h6hb
  • Andrew Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Piesert, Scott Russell, Susan Sons, Von Welch, and John Zage. 2019. Trusted CI Experiences in Cybersecurity and Service to Open Science. In PEARC'19: Practice and Experience in Advanced Research Computing, July 28-August 1, 2019, Chicago, IL, USA. ACM, New York, NY, USA, 8 pages. https://doi.org/h9x2 [pre-print]
  • Alex Withers, Brian Bockelman, Derek Weitzel, Duncan Brown, Jason Patton, Jeff Gaynor, Jim Basney, Todd Tannenbaum, You Alex Gao, and Zach Miller. 2019. SciTokens: Demonstrating Capability-Based Access to Remote Scientific Data using HTCondor. In Practice and Experience in Advanced Research Computing (PEARC ’19), July 28-August 1, 2019, Chicago, IL, USA. ACM, New York, NY, USA, 4 pages. https://doi.org/h9x3 [pre-print]
  • Derek Weitzel, Brian Bockelman, Jim Basney, Todd Tannenbaum, Zach Miller, and Jeff Gaynor. Capability-Based Authorization for HEP. In 23rd International Conference on Computing in High Energy and Nuclear Physics (CHEP 2018), July 9-13, 2018, Sofia, Bulgaria. https://doi.org/h9x4
  • Alex Withers, Brian Bockelman, Derek Weitzel, Duncan A. Brown, Jeff Gaynor, Jim Basney, Todd Tannenbaum, Zach Miller, "SciTokens: Capability-Based Secure Access to Remote Scientific Data", PEARC '18: Practice and Experience in Advanced Research Computing, July 2018, Pittsburgh, PA, USA. https://doi.org/gks7cw [pre-print]
  • Jim Basney, Terry Fleury, and Jeff Gaynor, "CILogon: A Federated X.509 Certification Authority for CyberInfrastructure Logon," Concurrency and Computation: Practice and Experience, Volume 26, Issue 13, pages 2225-2239, September 2014. https://doi.org/f6dqgk
  • Jim Basney, Rion Dooley, Jeff Gaynor, Thejaka Amila Kanewala, Suresh Marru, Marlon Pierce, and Joe Stubbs, "Integrating Science Gateways with XSEDE Security: A Survey of Credential Management Approaches," XSEDE Conference, July 2014, Atlanta, GA. https://doi.org/h9x5
  • Rion Dooley, Joe Stubbs, and Jim Basney, "The MyProxy Gateway," International Workshop on Science Gateways, June 2014, Dublin, Ireland. https://doi.org/h9x6
  • Thejaka Amila Kanewala, Suresh Marru, Jim Basney, and Marlon Pierce, "A Credential Store for Multi-Tenant Science Gateways," International Symposium on Cluster, Cloud and Grid Computing (CCGrid), May 2014, Chicago, IL. https://doi.org/h9x7 https://hdl.handle.net/2022/17379
  • Jim Basney and Von Welch, "Science Gateway Security Recommendations," Science Gateway Institute Workshop, September 2013, Indianapolis, IN. https://doi.org/h9x8 [pdf] [pptx]
  • Jim Basney, Terry Fleury, and Jeff Gaynor, "CILogon: A Federated X.509 Certification Authority for CyberInfrastructure Logon," XSEDE Conference, July 2013, San Diego, CA. https://doi.org/h9x9 (Best Technology Paper) [pdf] [slides] [poster]
  • Jim Basney, Rion Dooley, Jeff Gaynor, Suresh Marru, and Marlon Pierce, "Distributed Web Security for Science Gateways," Gateway Computing Environments Workshop (GCE11), November 17, 2011, Seattle, WA. https://doi.org/fxj858
  • Jim Basney and Jeff Gaynor, "An OAuth Service for Issuing Certificates to Science Gateways for TeraGrid Users," TeraGrid Conference, July 18-21, 2011, Salt Lake City, UT. https://doi.org/bw3dnd [slides]
  • Jim Basney, Von Welch, and Nancy Wilkins-Diehr, "TeraGrid Science Gateway AAAA Model: Implementation and Lessons Learned," TeraGrid Conference, August 2-5, 2010, Pittsburgh, PA. https://doi.org/bzvm2j (Best Paper: Gateways Track) [slides]
  • Jim Basney, Terry Fleury, and Von Welch, "Federated Login to TeraGrid," 9th Symposium on Identity and Trust on the Internet (IDtrust 2010), Gaithersburg, MD, April 2010. https://doi.org/c26zcf [slides] [poster]
  • Mehran Ahsant and Jim Basney, "Workflows in Dynamic and Restricted Delegation," Journal of Information System Security (JISSec), Volume 5, Number 4 (2009), Pages 3-26, ISSN 1551-0123. Note: This is an extended version of an ARES/CISIS 2009 paper.
  • Bobba, R., Muggli, J., Pant, M., Basney, J., and Khurana, H. Usable secure mailing lists with untrusted servers. In Proceedings of the 8th Symposium on Identity and Trust on the Internet (Gaithersburg, Maryland, April 14 - 16, 2009). K. Seamons, N. McBurnett, and T. Polk, Eds. IDtrust '09, vol. 373. ACM, New York, NY, 103-116. https://doi.org/bdngz7
  • Khurana, H., Basney, J., Bakht, M., Freemon, M., Welch, V., and Butler, R. Palantir: a framework for collaborative incident response and investigation. In Proceedings of the 8th Symposium on Identity and Trust on the Internet (Gaithersburg, Maryland, April 14 -16, 2009). K. Seamons, N. McBurnett, and T. Polk, Eds. IDtrust '09, vol. 373. ACM, New York, NY, 38-51. https://doi.org/ccxfr5
  • Mehran Ahsant and Jim Basney, "Workflows in Dynamic and Restricted Delegation," Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES/CISIS 2009), Fukuoka, Japan, March 2009. https://doi.org/cvhm3q
  • Mehran Ahsant, Esteban Tavalera Gonzalez and Jim Basney, "Security Credential Mapping in Grids," Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES/CISIS 2009), Fukuoka, Japan, March 2009. https://doi.org/bkzrwq
  • Jim Basney, Stuart Martin, JP Navarro, Marlon Pierce, Tom Scavo, Leif Strand, Tom Uram, Nancy Wilkins-Diehr, Wenjun Wu, and Choonhan Youn, "The Problem Solving Environments of TeraGrid, Science Gateways, and the Intersection of the Two," Fourth IEEE International Conference on eScience, December 2008, pages 725-734. https://doi.org/bnrb72
  • Lee, A., Winslett, M., Basney, J., and Welch, V. The Traust Authorization Service. ACM Trans. Inf. Syst. Secur. 11, 1 (Feb. 2008), 1-33. https://doi.org/bkzrwq
  • Himanshu Khurana, Radostina Koleva, Jim Basney, "Performance of Cryptographic Protocols for High-Performance, High-Bandwidth, High-Latency Grid Systems," 3rd IEEE International Conference on e-Science and Grid Computing, Bangalore, India, December 2007. https://doi.org/b6b9kc
  • J. Rowanhill, G. Wasson, Z. Hill, J. Basney, Y. Kiryakov, J. Knight, A. Nguyen-Tuong, A. Grimshaw and M. Humphrey, "Dynamic System-wide Reconfiguration of Grid Deployments in Response to Intrusion Detections," High Performance Computation Conference (HPCC 2007), Sept 26-28, 2007. Houston, TX. https://doi.org/bdvj7w [pdf]
  • Z. Hill, J. Rowanhill, A. Nguyen-Tuong, J. Basney, G. Wasson, J. Knight and M. Humphrey, "Meeting Virtual Organization Performance Goals through Adaptive Grid Reconfiguration," 8th IEEE/ACM International Conference on Grid Computing (Grid 2007), Austin, TX, Sept 19-21, 2007. https://doi.org/fspfxm
  • Mehran Ahsant, Jim Basney, and Lennart Johnsson, "Dynamic, Context-Aware, Least-Privilege Grid Delegation," 8th IEEE/ACM International Conference on Grid Computing (Grid 2007), Austin, TX, Sept 19-21, 2007. https://doi.org/d7h4mx
  • Jim Basney and Patrick Duda, "Clustering the Reliable File Transfer Service," TeraGrid Conference, Madison, WI, June 4-8, 2007. [pdf] [ppt]
  • Von Welch, Jim Barlow, James Basney, Doru Marcusiu, Nancy Wilkins-Diehr, "A AAAA model to support science gateways with community accounts," Concurrency and Computation: Practice and Experience, Volume 19, Issue 6, March 2007. https://doi.org/c59k36
  • Himanshu Khurana and Jim Basney, "On the Risks of IBE," Proceedings of the International Workshop on Applied PKC, Dalian, China, November 2006. [ppt] [pdf]
  • Himanshu Khurana, Jim Basney, Von Welch and Roy Campbell, "Operational Security Requirements for Large Collaborative Compute Infrastructures," International Workshop on Trusted Collaboration, in conjunction with CollaborateCom, Atlanta, November 2006. https://doi.org/c9zkjm
  • Terry Fleury, Jim Basney, and Von Welch, "Single Sign-On for Java Web Start Applications Using MyProxy," Proceedings of the ACM Workshop on Secure Web Services (associated with the 13th ACM Conference on Computer and Communications Security), November 3, 2006. https://doi.org/cf4mc9
  • Mehran Ahsant, Jim Basney, Olle Mulmo, Adam Lee and Lennart Johnsson, "Toward An On-demand Restricted Delegation Mechanism for Grids," Proceedings of the 7th IEEE/ACM International Conference on Grid Computing, Barcelona, September 28th-29th 2006. https://doi.org/bh83ks
  • Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam Slagell and Von Welch, "Mithril: Adaptable Security for Survivability in Collaborative Computing Sites," Workshop on Enterprise Network Security (WENS), in conjunction with SecureComm, September 2006. https://doi.org/bf8f38
  • R. Butler, M. Servilla, S. Gage, J. Basney, V. Welch, B. Baker, T. Fleury, P. Duda, D. Gehrig, M. Bletzinger, J. Tao, D. M. Freemon, "CyberInfrastructure for the Analysis of Ecological Acoustic Sensor Data: A Use Case Study in Grid Deployment," Challenges of Large Applications in Distributed Environments (CLADE 2006) Workshop (associated with the 15th International Symposium on High Performance Distributed Computing), Paris, France, June 19, 2006. https://doi.org/dctwrw
  • Adam J. Lee, Marianne Winslett, Jim Basney, and Von Welch, "Traust: A Trust Negotiation-Based Authorization Service for Open Systems," The Eleventh ACM Symposium on Access Control Models and Technologies (SACMAT), June 2006. https://doi.org/c3n2qz
  • A. J. Lee, M. Winslett, J. Basney, and V. Welch, "Traust: A Trust Negotiation Based Authorization Service," Demonstration Short Paper, Fourth International Conference on Trust Management (iTrust 2006), May 2006.
  • Tom Barton, Jim Basney, Tim Freeman, Tom Scavo, Frank Siebenlist, Von Welch, Rachana Ananthakrishnan, Bill Baker, Monte Goode, and Kate Keahey, "Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, Gridshib, and MyProxy," 5th Annual PKI R&D Workshop, April 2006. [pdf]
  • Jim Basney, "MyProxy Protocol," Global Grid Forum Experimental Document GFD-E.54, November 26, 2005. [pdf]
  • Daniel Kouril and Jim Basney, "A Credential Renewal Service for Long-Running Jobs," 6th IEEE/ACM International Workshop on Grid Computing (Grid 2005), Seattle, WA, November 13-14, 2005. [pdf]
  • Bruce Beckles, Von Welch, and Jim Basney, "Mechanisms for Increasing the Usability of Grid Security," International Journal of Human Computer Studies, Special Issue on HCI Research in Privacy and Security, Volume 63, Issues 1-2, July 2005, pages 74-101. https://doi.org/d6n67j
  • Jim Basney, Marty Humphrey, and Von Welch, "The MyProxy Online Credential Repository," Software: Practice and Experience, Volume 35, Issue 9, July 2005, pages 801-816. https://doi.org/ffv2wf [pdf]
  • Marty Humphrey, Jim Basney, and Jim Jokl, "The case for using Bridge Certificate Authorities for Grid Computing," Software: Practice and Experience, Volume 35, Issue 9, July 2005, pages 817-826. https://doi.org/dt8g26
  • D. Del Vecchio, J. Basney, N. Nagaratnam, and M. Humphrey, "CredEx: User-Centric Credential Selection and Management for Grid and Web Services," Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), Orlando, FL, July 12-15, 2005. https://doi.org/dhxh83
  • Jonathan Martin, Jim Basney, and Marty Humphrey, "Extending Existing Campus Trust Relationships to the Grid through the Integration of Pubcookie and MyProxy," 2005 International Conference on Computational Science (ICCS 2005), Emory University, Atlanta, GA, May 22-25, 2005. https://doi.org/fn9qj8 [pdf]
  • A. Grimshaw, M. Humphrey, J.C. Knight, A. Nguyen-Tuong, J. Rowanhill, G. Wasson, and J. Basney, "The Development of Dependable and Survivable Grids," 2005 Workshop on Dynamic Data Driven Applications (associated with the 2005 International Conference on Computational Science). Emory University, Atlanta, GA, May 22-25, 2005. https://doi.org/bxjscn [pdf]
  • Himanshu Khurana, Rafael Bonilla, Adam Slagell, Raja Afandi, Hyung-Seok Hahm, and Jim Basney, "Scalable Group Key Management with Partially Trusted Controllers," International Conference on Networking, Reunion Island, April 2005. https://doi.org/b7gqb7
  • Jim Basney, Shiva Shankar Chetan, Feng Qin, Sumin Song, Xiao Tu, and Marty Humphrey, "An OGSI CredentialManager Service," Proceedings of the Workshop on Grid Security Practice and Experience (UK e-Science Security Task Force), Oxford, 8-9 July 2004. Published as: University of York Department of Computer Science Technical Report YCS-2004-380. [pdf] [ppt]
  • Mehran Ahsant, Jim Basney, and Olle Mulmo, "Grid Delegation Protocol," Proceedings of the Workshop on Grid Security Practice and Experience (UK e-Science Security Task Force), Oxford, 8-9 July 2004. Published as: University of York Department of Computer Science Technical Report YCS-2004-380. [pdf]
  • Jim Jokl, Jim Basney, and Marty Humphrey, "Experiences using Bridge CAs for Grids," Proceedings of the Workshop on Grid Security Practice and Experience (UK e-Science Security Task Force), Oxford, 8-9 July 2004. Published as: University of York Department of Computer Science Technical Report YCS-2004-380. [pdf]
  • Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, and Marianne Winslett, "Negotiating Trust on the Grid," 2nd Workshop on Semantics in P2P and Grid Computing at the Thirteenth International World Wide Web Conference, New York, May 2004. [pdf]
  • Markus Lorch, Jim Basney, and Dennis Kafura, "A Hardware-secured Credential Repository for Grid PKIs," 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid2004), Chicago, Illinois, April 19-22, 2004. https://doi.org/fbgrmg [pdf]
  • Jim Basney, William Yurcik, Rafael Bonilla, and Adam Slagell, "The Credential Wallet: A Classification of Credential Repositories Highlighting MyProxy," 31st Research Conference on Communication, Information and Internet Policy (TPRC 2003), Arlington, Virginia, September 19-21, 2003. [pdf]

Technical Reports

  • J. Dopheide, J. Zage, J. Basney, “Trusted CI Impacts Report”, March 2022. https://doi.org/h9zb
  • Andrew Adams, Kay Avila, Jim Basney, Laura Christopherson, Melissa Cragin, Jeannette Dopheide, Terry Fleury, Calvin Frye, Florence Hudson, Manisha Kanodia, Jenna Kim, W. John MacMullen, Mats Rynge, Scott Sakai, Sandra Thompson, Karan Vahi, and John Zage, "Guidance for Trustworthy Data Management in Science Projects", September 2020. https://doi.org/h9zc
  • Andrew Adams, Kay Avila, Jim Basney, Melissa Cragin, Jeannette Dopheide, Terry Fleury, Florence Hudson, Jenna Kim, W. John MacMullen, Gary Motz, Sean Peisert, Mats Rynge, Scott Sakai, Sandra Thompson, Karan Vahi, Wendy Whitcup, and John Zage, "Scientific Data Security Concerns and Practices: A survey of the community by the Trustworthy Data Working Group", June 2020. https://doi.org/h9zd
  • Andrew K. Adams, Christopher Weaver, Jim Basney, Joe Breen, John Zage, Kay Avila, Lincoln Bryant, Mitchell Steinman, Reinhard Gentz, Robert Gardner, Sean Peisert, Shawn McKee, and Tom Barton, "Trusted CI SLATE Engagement: Final Report", January 2020. https://hdl.handle.net/2142/106019
  • Benn Oshrin, Scott Koranda, and Jim Basney, "voPerson Object Class and Recommendations", February 2018. https://doi.org/h9zf
  • "Federated Identity Management for Research Collaborations (Version 2.0)", June 2018. https://doi.org/h9zg
  • Jeannette Dopheide, John Zage, and Jim Basney, "The Trusted CI Broader Impacts Project Report", June 2018. https://hdl.handle.net/2022/22148
  • Von Welch, Jim Basney, Craig Jackson, Jim Marsteller, Barton Miller, "The Trusted CI Vision for an NSF Cybersecurity Ecosystem And Five-year Strategic Plan (2019-2023)", April 2018. https://hdl.handle.net/2022/22178
  • Jim Basney, Jayashree Ajay Candadai, Terry Fleury, Patrick Gossman, Mike Gregorowicz, Scott Koranda, Shawn McKee, Ben Meekhof, Ezra Kissel, "CTSC-OSiRIS Collaborative Design Review of OSiRIS Access Assertions: Using the OAuth 2.0 Threat Model (RFC 6819)", March 2017. https://hdl.handle.net/2022/21307
  • T. Barton, J. Basney, D. Groep, N. Harris, L. Johansson, D. Kelsey, S. Koranda, R. Wartel, A. West, H. Short, "A Security Incident Response Trust Framework for Federated Identity (Sirtfi)", 2016. https://refeds.org/sirtfi
  • Jim Basney, "Identity Management Best Practices: A CTSC Blog Series," November 2015. https://hdl.handle.net/2022/20452
  • Jim Basney, Patrick Duda, Von Welch, and Craig Jackson, "DataONE: Identity Management System Review," October 2013. https://hdl.handle.net/2022/16926
  • Jim Basney and Scott Koranda, "A Study of Three Approaches to International Identity Federation for the LIGO Project," July 2013. https://hdl.handle.net/2022/16760
  • Jim Basney and Scott Koranda, "InCommon Membership in eduGAIN: the LIGO Perspective," May 2013. https://hdl.handle.net/2022/16690
  • Randy Butler, Von Welch, Jim Basney, Scott Koranda, William Barnett, and Doug Pearson, "Report of NSF Workshop Series on Scientific Software Security Innovation Institute," November 2011. https://hdl.handle.net/2142/107147A
  • Jim Basney, Scott Koranda, and Von Welch, "An Analysis of the Benefits and Risks to LIGO When Participating in Identity Federations," October 2011. https://dcc.ligo.org/LIGO-G1100964/public [pdf]
  • Randy Butler, Von Welch, Jim Basney, Scott Koranda, William Barnett, and Doug Pearson, "Report of NSF Workshop Series on Scientific Software Security Innovation Institute," October 2010. https://hdl.handle.net/2142/107146
  • Jim Basney, "Mapping InCommon Bronze and Silver Identity Assurance Profiles to TAGPMA SLCS Requirements," March 25, 2009. [pdf]
  • Himanshu Khurana, Radostina Koleva, Jim Basney, "Performance of Cryptographic Protocols for High-Performance, High-Bandwidth, High-Latency Grid Systems," NCSA Technical Report, March 2007. [pdf]
  • Jim Basney, Roy Campbell, Himanshu Khurana, Von Welch, "Towards Operational Security for GENI," GENI Design Document 06-10, July 2006.
  • Jim Basney, Von Welch, and Frank Siebenlist, "A Roadmap for Integration of Grid Security with One-Time Passwords," April 18, 2004. [pdf]
  • Jim Basney and Von Welch, "GridLogon: A Grid Service for Security Usability," Dec 1, 2003. [pdf]
  • Jim Basney, "Proposal: Centralized Key Management for the Alliance PKI," November 25, 2002. [pdf]
  • Jim Basney, "GSI Online Credential Retrieval - Requirements," Global Grid Forum GWD-I (Informational), February 2002. [pdf]
  • Jim Basney, "MyProxy Development Plan," October 4, 2001. [pdf]
  • Jim Basney, "Credential Wallets," July 22, 2001. [pdf]

Presentations

Posters

  • CILogon, NSF Research Infrastructure Workshop, September 2022. [pdf]
  • Distributed Web Security for Science Gateways, NSF Secure and Trustworthy Cyberspace (SaTC) Principal Investigators' Meeting, November 2012. [pdf]
  • CIlogon: Federated Logon to NSF Cyberinfrastructure, Internet2 Member Meeting, April 2010. [pdf]
  • Federated Logon to TeraGrid, Internet2 Member Meeting, April 2010. [pdf]
  • MyProxy Online Credential Repository. GlobusWorld, January 13, 2003. [pdf]
  • NCSA Grid Technologies Group. Alliance All-Hands Meeting, May 8, 2002. [pdf]

Funded Research

Please contact me for a copy of the grant proposal for any project listed below. See also: NSF Award Search

  • PI: Sean Peisert, Co-PIs: Kelli Shute, Carolyn Ellis, James Marsteller, James Basney. Title: Trusted CI, The NSF Cybersecurity Center of Excellence. Duration: October 2024 to September 2029. Amount: $29,920,722. Source: National Science Foundation Interagency Agreement #A2407-049-089-064206.0.
  • PI: Phuong Cao, Co-PIs: Ravishankar Iyer, James Basney, Alexander Withers. Title: FMitF: Track II: Bringing Verification-Aware Languages and Federated Authentication to Enable Secure Computing for Scientific Communities. Duration: August 2023 to January 2025. Amount: $99,999. Source: National Science Foundation award number 2319190.
  • PI: James Basney, Co-PIs: Barton Miller, Sean Peisert, Kelli Shute. Title: CICI: CCoE: Trusted CI: Advancing Trustworthy Science. Duration: September 2022 to December 2024. Amount: $6,498,601. Source: National Science Foundation award number 2241313.
  • PI: Emad Tajkhorshid, Co-PIs: James Basney, Seid Koric. Title: Collaborative Research: Frameworks: Cybershuttle: An end-to-end Cyberinfrastructure Continuum to accelerate Discovery in Science and Engineering. Duration: September 2022 to August 2027. Amount: $1,600,001. Source: National Science Foundation award number 2209875.
  • PI: James Basney, Co-PIs: Brian Bockelman, Derek Weitzel. Title: CICI: UCSS: SciAuth: Deploying Interoperable and Usable Authorization Tokens to Enable Scientific Collaborations. Duration: July 2021 to June 2025. Amount: $499,959. Source: National Science Foundation award number 2114989. [pdf]
  • PI: Von Welch, Co-PIs: Barton Miller, James Basney, Sean Peisert, Kelli Shute. Title: CICI: CCoE: Trusted CI: Advancing Trustworthy Science. Duration: October 2019 to September 2022. Amount: $6,100,842. Source: National Science Foundation award number 1920430. [pdf]
  • PI: Marlon Pierce, Co-PIs: James Basney, Suresh Marru, Enis Afgan. Title: CICI: SSC: Securing Science Gateway Cyberinfrastructure with Custos. Duration: August 2018 to July 2023. Amount: $997,672. Source: National Science Foundation award number 1840003.
  • PI: James Basney. Co-PIs: Alexander Withers, Brian Bockelman, Duncan Brown, and Todd Tannenbaum. Title: CICI: CE: SciTokens: Capability-Based Secure Access to Remote Scientific Data. Duration: July 2017 to June 2021. Amount: $1,000,000. Source: National Science Foundation award number 1738962. [pdf]
  • PI: Von Welch, Co-PIs: Randal Butler, James Basney, James Marsteller, Craig Jackson. Title: CICI: Center of Excellence: Center for Trustworthy Scientific Cyberinfrastructure. Duration: January 2016 through December 2018. Amount: $4,999,709. Source: National Science Foundation award number 1547272. [pdf]
  • PI: James Basney. Co-PI: Scott Koranda. Title: CICI: Secure Data Architecture: CILogon 2.0 - An Integrated Identity and Access Management Platform for Science. Duration: January 2016 through December 2018. Amount: $499,973. Source: National Science Foundation award number 1547268. [pdf]
  • PI: Jill Gemmill, Co-PIs: James Basney, James Bottum, Kuang-Ching Wang, Steven Corbato. Title: CC*IIE IAM: FeduShare: Bridging Campus and Research Identity and Access Management for Self-Managed Collaboration. Duration: October 2014 through September 2016. Amount: $291,040. Source: National Science Foundation award number 1440609.
  • PI: Miron Livny, Co-PIs: Jim Basney, Barton Miller, Von Welch. Title: Continuous Software Assurance through a National Marketplace. Duration: September 2012 through September 2017. Amount: $23,553,163. Source: Department of Homeland Security (DHS) Science and Technology Directorate, Homeland Security Advanced Research Projects Agency, Cyber Security Division (DHS S&T/HSARPA/CSD), BAA 11-02 and Air Force Research Laboratory, Information Directorate under agreement number FA8750-12-2-0289.
  • PI: Von Welch, Co-PIs: Randal Butler, Scott Koranda, James Basney. Title: Center for Trustworthy Scientific Cyberinfrastructure. Duration: October 2012 through September 2015. Amount: $4,297,212. Source: National Science Foundation award number 1234408.
  • PI: James Basney. Title: CILogon-HA: Higher Assurance Federated Identities for DOE Science. Duration: September 2012 through August 2015. Amount: $450,000. Source: Department of Energy award number DE-SC0008597.
  • PI: James Basney. Title: SAML Enhanced Client GSS-API Implementation. Date: December 2011. Amount: $75,000. Source: Internet Society (gift).
  • PI: James Basney, Co-PIs: Marlon Pierce and Rion Dooley. Title: SDCI Sec: Distributed Web Security for Science Gateways. Duration: August 2011 through July 2015. Amount: $948,821. Source: National Science Foundation award number 1127210.
  • PI: Randal Butler, Co-PIs: Douglas Pearson, James Basney, William Barnett. Title: Scientific Software Security Innovation Institute (S3I2). Duration: August 2010 through July 2012. Amount: $49,862. Source: National Science Foundation award number 1043843.
  • PI: Von Welch, Co-PIs: Randal Butler and James Basney. Title: A Cyber Identity Infrastructure for National Science. Duration: September 2009 through August 2013. Amount: $1,757,640. Source: National Science Foundation award number 0943633.
  • PI: James Basney, Co-PIs: Randal Butler and Von Welch. Title: CILogon: Secure Access to National-Scale CyberInfrastructure. Duration: June 2009 through May 2011. Amount: $399,837. Source: National Science Foundation award number 0850557.
  • PI: James Basney, Co-PI: Marty Humphrey. Title: Integration of the MyProxy Online Credential Repository into the NSF Middleware Initiative Software Infrastructure. Duration: July 2002 through June 2005. Amount: $598,343. Source: National Science Foundation award number 0222571.

Service

  • National Science Foundation Funding Panel Review Member: 2004, 2005, 2018, 2019, 2023
  • Program Committee Member: ISWC 2004 Trust Workshop, DIVO 2004, MGC 2004, MGC 2005, HPDC-15, WASR 2006, Grid 2006, MGC 2006, GCE 2006, CCGrid 2007, AINA 2007, WWW 2007, 2007 IEEE TCSC Doctoral Symposium, Grid 2007, SC07, SECOVAL 2007, MGC 2007, AINA 2008, CCGrid 2008, IDtrust 2008, 2008 IEEE TCSC Doctoral Symposium, SC08, Grid 2008, MGC 2008, CCGrid 2009, MGC 2009, SC10, Grid 2010, MGC 2010, HPDC 2011, MGC 2011, SC12, XSEDE13, SC13, SC14, XSEDE14, CCGrid 2015, XSEDE15, XSEDE16, PEARC17, ISGC 2020, PEARC20, ISGC 2022, ISGC 2023, ISGC 2024