{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:15:47Z","timestamp":1725682547284},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,26]]},"DOI":"10.1145\/3311790.3396635","type":"proceedings-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T04:34:20Z","timestamp":1595392460000},"page":"278-284","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Custos: Security Middleware for Science Gateways"],"prefix":"10.1145","author":[{"given":"Isuru","family":"Ranawaka","sequence":"first","affiliation":[{"name":"Indiana University, USA"}]},{"given":"Suresh","family":"Marru","sequence":"additional","affiliation":[{"name":"Indiana University, USA"}]},{"given":"Juleen","family":"Graham","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, USA"}]},{"given":"Aarushi","family":"Bisht","sequence":"additional","affiliation":[{"name":"Indiana University, USA"}]},{"given":"Jim","family":"Basney","sequence":"additional","affiliation":[{"name":"Univeristy of Illinois, USA"}]},{"given":"Terry","family":"Fleury","sequence":"additional","affiliation":[{"name":"University of Illinois, USA"}]},{"given":"Jeff","family":"Gaynor","sequence":"additional","affiliation":[{"name":"University of Illinois, USA"}]},{"given":"Dimuthu","family":"Wannipurage","sequence":"additional","affiliation":[{"name":"Indiana University, USA"}]},{"given":"Marcus","family":"Christie","sequence":"additional","affiliation":[{"name":"Indiana University, USA"}]},{"given":"Alexandru","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, USA"}]},{"given":"Enis","family":"Afgan","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, USA"}]},{"given":"Marlon","family":"Pierce","sequence":"additional","affiliation":[{"name":"Indiana University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,7,26]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Dave Bouvier, Martin \u010cech, John Chilton, Dave Clements, Nate Coraor","author":"Afgan Enis","year":"2018","unstructured":"Enis Afgan , Dannon Baker , B\u00e9r\u00e9nice Batut , Marius Van Den\u00a0Beek , Dave Bouvier, Martin \u010cech, John Chilton, Dave Clements, Nate Coraor , Bj\u00f6rn\u00a0A Gr\u00fcning, 2018 . The Galaxy platform for accessible, reproducible and collaborative biomedical analyses: 2018 update. Nucleic acids research 46, W1 (2018), W537\u2013W544. Enis Afgan, Dannon Baker, B\u00e9r\u00e9nice Batut, Marius Van Den\u00a0Beek, Dave Bouvier, Martin \u010cech, John Chilton, Dave Clements, Nate Coraor, Bj\u00f6rn\u00a0A Gr\u00fcning, 2018. The Galaxy platform for accessible, reproducible and collaborative biomedical analyses: 2018 update. Nucleic acids research 46, W1 (2018), W537\u2013W544."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1016\/j.future.2018.04.037"},{"unstructured":"Apache Airavata. [n.d.]. Custos Security. Retrieved May 18 2020 from https:\/\/github.com\/apache\/airavata-custos Apache Airavata. [n.d.]. Custos Security. Retrieved May 18 2020 from https:\/\/github.com\/apache\/airavata-custos","key":"e_1_3_2_2_3_1"},{"unstructured":"Jim Basney Heather Flanagan Terry Fleury Jeff Gaynor Scott Koranda and Benn Oshrin. [n.d.]. CILogon: Enabling Federated Identity and Access Management for Scientific Collaborations. ([n.\u00a0d.]). Jim Basney Heather Flanagan Terry Fleury Jeff Gaynor Scott Koranda and Benn Oshrin. [n.d.]. CILogon: Enabling Federated Identity and Access Management for Scientific Collaborations. ([n.\u00a0d.]).","key":"e_1_3_2_2_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_5_1","DOI":"10.1109\/CLUSTER.2013.6702697"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_6_1","DOI":"10.1145\/1838574.1838576"},{"unstructured":"A Biancini L Florio M Haase Markus Hardt M Jankowski Jens Jensen C Kanellopoulos N Liampotis Slavek Licehammer S Memon 2016. AARC: first draft of the blueprint architecture for authentication and authorisation infrastructures. arXiv preprint arXiv:1611.07832(2016). A Biancini L Florio M Haase Markus Hardt M Jankowski Jens Jensen C Kanellopoulos N Liampotis Slavek Licehammer S Memon 2016. AARC: first draft of the blueprint architecture for authentication and authorisation infrastructures. arXiv preprint arXiv:1611.07832(2016).","key":"e_1_3_2_2_7_1"},{"volume-title":"PODC, Vol.\u00a07.","author":"Brewer A","unstructured":"Eric\u00a0 A Brewer . 2000. Towards robust distributed systems . In PODC, Vol.\u00a07. Portland, OR . Eric\u00a0A Brewer. 2000. Towards robust distributed systems. In PODC, Vol.\u00a07. Portland, OR.","key":"e_1_3_2_2_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.1145\/3093338.3093367"},{"doi-asserted-by":"crossref","unstructured":"Marcus\u00a0A Christie Anuj Bhandar Supun Nakandala Suresh Marru Eroma Abeysinghe Sudhakar Pamidighantam and Marlon\u00a0E Pierce. 2019. Managing authentication and authorization in distributed science gateway middleware. Future Generation Computer Systems(2019). Marcus\u00a0A Christie Anuj Bhandar Supun Nakandala Suresh Marru Eroma Abeysinghe Sudhakar Pamidighantam and Marlon\u00a0E Pierce. 2019. Managing authentication and authorization in distributed science gateway middleware. Future Generation Computer Systems(2019).","key":"e_1_3_2_2_10_1","DOI":"10.1016\/j.future.2019.07.018"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1145\/3219104.3219129"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.1145\/38714.38742"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.21105\/joss.00622"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.5555\/3311987"},{"unstructured":"Internet2. [n.d.]. Custos Security. Retrieved May 18 2020 from http:\/\/www.internet2.edu\/comanage Internet2. [n.d.]. Custos Security. Retrieved May 18 2020 from http:\/\/www.internet2.edu\/comanage","key":"e_1_3_2_2_15_1"},{"unstructured":"Internet2. [n.d.]. Grouper. Retrieved May 18 2020 from https:\/\/github.com\/internet2\/grouper Internet2. [n.d.]. Grouper. Retrieved May 18 2020 from https:\/\/github.com\/internet2\/grouper","key":"e_1_3_2_2_16_1"},{"doi-asserted-by":"crossref","unstructured":"M Jones J Bradley M Machulak and P Hunt. 2015. OAuth 2.0 Dynamic Client Registration Protocol. Technical Report. IETF RFC 7591 July. M Jones J Bradley M Machulak and P Hunt. 2015. OAuth 2.0 Dynamic Client Registration Protocol. Technical Report. IETF RFC 7591 July.","key":"e_1_3_2_2_17_1","DOI":"10.17487\/RFC7591"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1109\/CCGrid.2014.95"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1002\/cpe.3526"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1145\/2110486.2110490"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.5555\/2220076.2220210"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1109\/eScience.2016.7870911"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1145\/3093338.3093359"},{"unstructured":"Sean Peisert Von Welch Andrew Adams RuthAnne Bevier Michael Dopheide Rich LeDuc Pascal Meunier Steve Schwab and Karen Stocks. 2017. Open Science Cyber Risk Profile (OSCRP). (2017). Sean Peisert Von Welch Andrew Adams RuthAnne Bevier Michael Dopheide Rich LeDuc Pascal Meunier Steve Schwab and Karen Stocks. 2017. Open Science Cyber Risk Profile (OSCRP). (2017).","key":"e_1_3_2_2_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1145\/3219104.3229240"},{"unstructured":"Marlon\u00a0E Pierce Mark\u00a0A Miller Emre\u00a0H Brookes Mona Wong Enis Afgan Yan Liu Sandra Gesing Maytal Dahan Suresh Marru and Tony Walker. 2018. Towards a science gateway reference architecture. (2018). Marlon\u00a0E Pierce Mark\u00a0A Miller Emre\u00a0H Brookes Mona Wong Enis Afgan Yan Liu Sandra Gesing Maytal Dahan Suresh Marru and Tony Walker. 2018. Towards a science gateway reference architecture. (2018).","key":"e_1_3_2_2_26_1"},{"key":"e_1_3_2_2_27_1","volume-title":"Retrieved","author":"Richardson Chris","year":"2014","unstructured":"Chris Richardson . 2014 . Pattern: Database per service . Retrieved May 18, 2020 from http:\/\/microservices.io\/patterns\/data\/database-per-service.html Chris Richardson. 2014. Pattern: Database per service. Retrieved May 18, 2020 from http:\/\/microservices.io\/patterns\/data\/database-per-service.html"},{"doi-asserted-by":"crossref","unstructured":"J Richer M Jones J Bradley and M Machulak. 2015. OAuth 2.0 Dynamic Client Registration Management Protocol. Technical Report. IETF RFC 7592. http:\/\/www. rfc-editor. org\/rfc\/rfc7592. txt. J Richer M Jones J Bradley and M Machulak. 2015. OAuth 2.0 Dynamic Client Registration Management Protocol. Technical Report. IETF RFC 7592. http:\/\/www. rfc-editor. org\/rfc\/rfc7592. txt.","key":"e_1_3_2_2_28_1","DOI":"10.17487\/RFC7592"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1016\/j.future.2017.09.069"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_30_1","DOI":"10.1145\/2567948.2579215"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_31_1","DOI":"10.1109\/eScience.2016.7870901"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.5555\/1232515.1232522"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"],"acronym":"PEARC '20","name":"PEARC '20: Practice and Experience in Advanced Research Computing","location":"Portland OR USA"},"container-title":["Practice and Experience in Advanced Research Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311790.3396635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T13:37:20Z","timestamp":1673444240000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311790.3396635"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,26]]},"references-count":32,"alternative-id":["10.1145\/3311790.3396635","10.1145\/3311790"],"URL":"https:\/\/doi.org\/10.1145\/3311790.3396635","relation":{},"subject":[],"published":{"date-parts":[[2020,7,26]]},"assertion":[{"value":"2020-07-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}