{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:33:13Z","timestamp":1725489193249},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734079"},{"type":"electronic","value":"9783540734086"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73408-6_12","type":"book-chapter","created":{"date-parts":[[2007,8,13]],"date-time":"2007-08-13T13:23:01Z","timestamp":1187011381000},"page":"170-180","source":"Crossref","is-referenced-by-count":2,"title":["Bootstrapping a Global SSO from Network Access Control Mechanisms"],"prefix":"10.1007","author":[{"given":"Manuel","family":"S\u00e1nchez","sequence":"first","affiliation":[]},{"given":"Gabriel","family":"L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"\u00d3scar","family":"C\u00e1novas","sequence":"additional","affiliation":[]},{"given":"Antonio F.","family":"G\u00f3mez-Skarmeta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"DAMe Project. http:\/\/dame.inf.um.es"},{"key":"12_CR2","unstructured":"Internet 2 Home Page. http:\/\/www.internet2.edu"},{"key":"12_CR3","unstructured":"Carmody, S.: Radius profile of SAML. Revision 2 (October 2006), http:\/\/stc.cis.brown.edu\/~stc\/Projects\/Projects-using-Shib\/eduRoam\/Radius-SAML-Profile-v1.html"},{"key":"12_CR4","unstructured":"Anderson, A., et al.: EXtensible Access Control Markup Language (XACML) Version 1.0, OASIS Standard (February 2003)"},{"key":"12_CR5","unstructured":"Eve, M., Prateek, M., Rob, P.: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) v1.1, OASIS Standard (September 2003)"},{"key":"12_CR6","unstructured":"Kerver, B., Stanica, M., Rauschenbach, J., Wierenga, K.: Deliverable DJ5.3.1: Documentation on G\u00c9ANT2 Universal Single Sign-On (uSSO) Requirements, GN2 JRA5. Geant 2 (February 2007)"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1389-1286(00)00048-7","volume":"33","author":"D.P. Kormann","year":"2000","unstructured":"Kormann, D.P., Rubin, A.D.: Risks of the passport single signon protocol. Computer Networks\u00a033, 51\u201358 (2000)","journal-title":"Computer Networks"},{"key":"12_CR8","unstructured":"LAN MAN Standards Committee of the IEEE Computer Society. IEEE Draft P802.1X\/D11: Standard for Port based Network Access Control (March 2001)"},{"key":"12_CR9","unstructured":"L\u00f3pez, D.R., Macias, J., Molina, M., Rauschenbach, J., Solberg, A., Stanica, M.: Deliverable DJ5.2.3.1: Best Practice Guide - AAI Cookbook, 1st edn., GN2 JRA5. Geant 2 (September 2006)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"L\u00f3pez, G., C\u00e1novas, O., G\u00f3mez, A.F., Jimenez, J.D., Mar\u00edn, R.: A network access control approach based on the aaa architecture and authorzation attributes. Journal of Network and Computer Applications JNCA\u00a0 (to be published, 2006)","DOI":"10.1016\/j.jnca.2005.07.010"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Newman","year":"1994","unstructured":"Newman, B.C., Ts\u2019o, T.: Kerberos: An authentication service for computer networks. IEEE Communications\u00a032, 33\u201338 (1994)","journal-title":"IEEE Communications"},{"key":"12_CR12","unstructured":"Palekar, A., Simon, D., Salowey, J., Zhou, H., Zorn, G., Josefsson, S.: Protected EAP Protocol (PEAP) Version 2, Internet Draft (October 2004)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Scavo, T., Cantor, S.: Shibboleth Architecture. Technical Overview, Working Draft 02 (June 2005)","DOI":"10.26869\/TI.65.1"},{"key":"12_CR14","unstructured":"S\u00e1nchez, M., L\u00f3pez, G., C\u00e1novas, O., G\u00f3mez-Skarmeta, A.F.: A proposal for extending the eduroam infrastructure with authorization mechanisms. In: 5th International Workshop on Security in Information Systems (submitted 2007)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Wierenga, K., Florio, L.: Eduroam: past, present and future. In: TERENA Networking Conference (2005)","DOI":"10.12921\/cmst.2005.11.02.169-173"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73408-6_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T19:32:18Z","timestamp":1684006338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73408-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734079","9783540734086"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73408-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}