Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Von Welch is active.

Publication


Featured researches published by Von Welch.


high performance distributed computing | 2001

An online credential repository for the Grid: MyProxy

Jason Novotny; Steven Tuecke; Von Welch

Grid portals, based on standard Web technologies, are increasingly used to provide user interfaces for computational and data grids. However, such Grid portals do not integrate cleanly with existing Grid security systems such as the Grid Security Infrastructure (GSI), due to lack of delegation capabilities in Web security mechanisms. We solve this problem using an online credentials repository system, called MyProxy. MyProxy allows Grid portals to use the GSI to interact with Grid resources in a standard, secure manner. We examine the requirements of Grid portals, give an overview of the GSI, and demonstrate how MyProxy enables them to function together. The architecture and security of the MyProxy system are described in detail.


IEEE Computer | 2000

A national-scale authentication infrastructure

Randy Butler; Von Welch; Douglas Engert; Ian T. Foster; Steven Tuecke; John Volmer; Carl Kesselman

Participants in virtual organizations commonly need to share resources such as data archives, computer cycles, and networks, resources usually available only with restrictions based on the requested resources nature and the users identity. Thus, any sharing mechanism must have the ability to authenticate the users identity and determine whether the user is authorized to request the resource. Virtual organizations tend to be fluid, however, so authentication mechanisms must be flexible and lightweight, allowing administrators to quickly establish and change resource-sharing arrangements. Nevertheless, because virtual organizations complement rather than replace existing institutions, sharing mechanisms cannot change local policies and must allow individual institutions to maintain control over their own resources. Our group has created and deployed an authentication and authorization infrastructure that meets these requirements: the Grid Security Infrastructure (I. Foster et al., 1998). GSI offers secure single sign-ons and preserves site control over access policies and local security. It provides its own versions of common applications, such as FTP and remote login, and a programming interface for creating secure applications. Dozens of supercomputers and storage systems already use GSI, a level of acceptance reached by few other security infrastructures.


grid computing | 2002

Fine-Grain Authorization for Resource Management in the Grid Environment

Katarzyna Keahey; Von Welch

In this document we describe our work-in-progress for enabling finegrain authorization of resource management. In particular we address the needs of Virtual Organizations (VOs) to enforce their own polices in addition to those of the resource owners.


symposium on access control models and technologies | 2006

Traust: a trust negotiation-based authorization service for open systems

Adam J. Lee; Marianne Winslett; Jim Basney; Von Welch

In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizational boundaries. Researchers have shown that TN is indeed a viable solution for these environments by developing a number of policy languages and strategies for TN which have desirable theoretical properties. Further, existing protocols, such as TLS, have been altered to interact with prototype TN systems, thereby illustrating the utility of TN. Unfortunately, modifying existing protocols is often a time-consuming and bureaucratic process which can hinder the adoption of this promising technology.In this paper, we present Traust, a third-party authorization service that leverages the strengths of existing proto-type TN systems. Traust acts as an authorization broker that issues access tokens for resources in an open system after entities use TN to satisfy the appropriate resource access policies. The Traust architecture was designed to allow Traust to be integrated either directly with newer trust-aware applications or indirectly with existing legacy applications; this exibility paves the way for the incremental adoption of TN technologies without requiring widespread software or protocol upgrades. We discuss the design and implementation of Traust, the communication protocol used by the Traust system, and its performance. We also discuss our experiences using Traust to broker access to legacy resources, our proposal for a Traust-aware version of the GridFTP protocol, and Trausts resilience to attack.


international conference on critical infrastructure protection | 2008

TOWARDS A TAXONOMY OF ATTACKS AGAINST ENERGY CONTROL SYSTEMS

Terry Fleury; Himanshu Khurana; Von Welch

Control systems for energy such as Supervisory Control And Data Ac- quisition (SCADA) involve a hierarchy of sensing, monitoring, and con- trol devices connected to centralized control stations/centers. With in- creasing connectivity to commercial o-the-shelf technologies these sys- tems have become vulnerable to cyber attacks. To assist the energy sector in dealing with these cyber attacks, we propose the development of a taxonomy. In this work we take a first step towards a taxonomy by developing a comprehensive model of attacks, vulnerabilities, and damages in control systems. We populate the model with a survey of available literature from industry, academia, and national laboratories.


ACM Transactions on Information and System Security | 2008

The Traust Authorization Service

Adam J. Lee; Marianne Winslett; Jim Basney; Von Welch

In recent years, trust negotiation has been proposed as a novel authorization solution for use in open-system environments, in which resources are shared across organizational boundaries. Researchers have shown that trust negotiation is indeed a viable solution for these environments by developing a number of policy languages and strategies for trust negotiation that have desirable theoretical properties. Further, existing protocols, such as TLS, have been altered to interact with prototype trust negotiation systems, thereby illustrating the utility of trust negotiation. Unfortunately, modifying existing protocols is often a time-consuming and bureaucratic process that can hinder the adoption of this promising technology. In this paper, we present Traust, a third-party authorization service that leverages the strengths of existing prototype trust negotiation systems. Traust acts as an authorization broker that issues access tokens for resources in an open system after entities use trust negotiation to satisfy the appropriate resource access policies. The Traust architecture was designed to allow Traust to be integrated either directly with newer trust-aware applications or indirectly with existing legacy applications; this flexibility paves the way for the incremental adoption of trust negotiation technologies without requiring widespread software or protocol upgrades. We discuss the design and implementation of Traust, the communication protocol used by the Traust system, and its performance. We also discuss our experiences using Traust to broker access to legacy resources, our proposal for a Traust-aware version of the GridFTP protocol, and Trausts resilience to attack.


Concurrency and Computation: Practice and Experience | 2007

A AAAA model to support science gateways with community accounts

Von Welch; Jim Barlow; Jim Basney; Doru Marcusiu; Nancy Wilkins-Diehr

Science gateways have emerged as a concept for allowing large numbers of users in communities to easily access high-performance computing resources which previously required a steep learning curve to utilize. In order to reduce the complexity of managing access for these communities, which can often be large and dynamic, the concept of community accounts is being considered. This paper proposes a security model for community accounts, organized by the four As of security: Authentication, Authorization, Auditing and Accounting. Copyright


identity and trust on the internet | 2009

Palantir: a framework for collaborative incident response and investigation

Himanshu Khurana; Jim Basney; Mehedi Bakht; D. Michael Freemon; Von Welch; Randy Butler

Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we argue that it is insufficient to rely on organizational incident response teams or even trusted coordinating response teams. Instead, there is need to develop a framework that enables responders to establish trust and achieve an effective collaborative response and investigation process across multiple organizations and legal entities to track the adversary, eliminate the threat and pursue prosecution of the perpetrators. In this work we develop such a framework for effective collaboration. Our approach is motivated by our experiences in dealing with a large-scale distributed attack that took place in 2004 known as Incident 216. Based on our approach we present the Palantir system that comprises conceptual and technological capabilities to adequately respond to such attacks. To the best of our knowledge this is the first work proposing a system model and implementation for a collaborative multi-site incident response and investigation effort.


communications and multimedia security | 2005

Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure

David W. Chadwick; Sassa Otenko; Von Welch

In this article the new trend in authorisation decision making will be described, using the Security Assertions Mark up Language (SAML). We then present an overview of the Globus Toolkit (GT), used in Grid computing environments, and highlight its authorisation requirements. We then introduce the PERMIS authorisation infrastructure and describe how it has been adapted to support SAML so that it can be deployed to make authorisation decisions for GTversion 3.3.


Cluster Computing | 2007

Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment

Randy Butler; Mark Servilla; Stuart H. Gage; Jim Basney; Von Welch; Bill Baker; Terry Fleury; Patrick Duda; David Gehrig; Michael Bletzinger; Jing Tao; D. Michael Freemon

Abstract The LTER Grid Pilot Study was conducted by the National Center for Supercomputing Applications, the University of New Mexico, and Michigan State University, to design and build a prototype grid for the ecological community. The featured grid application, the Biophony Grid Portal, manages acoustic data from field sensors and allows researchers to conduct real-time digital signal processing analysis on high-performance systems via a web-based portal. Important characteristics addressed during the study include the management, access, and analysis of a large set of field collected acoustic observations from microphone sensors, single signon, and data provenance. During the development phase of this project, new features were added to standard grid middleware software and have already been successfully leveraged by other, unrelated grid projects. This paper provides an overview of the Biophony Grid Portal application and requirements, discusses considerations regarding grid architecture and design, details the technical implementation, and summarizes key experiences and lessons learned that are generally applicable to all developers and administrators in a grid environment.

Collaboration


Dive into the Von Welch's collaboration.

Top Co-Authors

Avatar

Ian T. Foster

Argonne National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Randy Heiland

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Craig Jackson

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Carl Kesselman

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Craig A. Stewart

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Frank Siebenlist

Argonne National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Laura Pearlman

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Robert Cowles

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

S. Koranda

University of Wisconsin–Milwaukee

View shared research outputs
Researchain Logo
Decentralizing Knowledge