{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:54:08Z","timestamp":1754157248366,"version":"3.41.2"},"reference-count":18,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T00:00:00Z","timestamp":1193097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper seeks to present an overview and some preliminary results of the DAMe project. The main goal of this project was to define a unified authentication and authorisation system for federated services hosted in the eduroam network.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>This paper presents the main initiatives and technologies related to the DAMe project and some first designs that show how the main goals are already being achieved.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>At present, there are several activities of DAMe in progress, such as the design and implementation of a multiplatform PEAP supplicant, the middleware for managing the SSO tokens and the design of new common services for eduGAIN.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper is based on results from the DAMe project and the knowledge of the authors and will be of interest to those in the same field.<\/jats:p><\/jats:sec>","DOI":"10.1108\/10662240710830181","type":"journal-article","created":{"date-parts":[[2007,10,20]],"date-time":"2007-10-20T05:27:50Z","timestamp":1192858070000},"page":"479-494","source":"Crossref","is-referenced-by-count":2,"title":["Deploying authorisation mechanisms for federated services in eduroam (DAMe)"],"prefix":"10.1108","volume":"17","author":[{"given":"\u00d3scar","family":"C\u00e1novas","sequence":"first","affiliation":[]},{"given":"Antonio F.","family":"G\u00f3mez\u2010Skarmeta","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"doi-asserted-by":"crossref","unstructured":"Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J. and Levkowetz, H. (2004), Extensible Authentication Protocol (EAP), Request for Comments (RFC) 3748.","key":"key2022021019554189100_b1","DOI":"10.17487\/rfc3748"},{"doi-asserted-by":"crossref","unstructured":"Calhoun, P., Zorn, G., Spence, D. and Mitton, D. (2005), Diameter Network Access Server Application, Request for Comments (RFC) 4005.","key":"key2022021019554189100_b2","DOI":"10.17487\/rfc4005"},{"doi-asserted-by":"crossref","unstructured":"Calhoun, P., Loughney, J., Guttman, E., Zorn, G. and Arkko, J. (2003), Diameter Base Protocol, Request for Comments (RFC) 3588.","key":"key2022021019554189100_b3","DOI":"10.17487\/rfc3588"},{"unstructured":"Carmody, S. (2006), Radius Profile of SAML. Revision 2, available at: http:\/\/stc.cis.brown.edu\/ \u223c\u2009stc\/Projects\/Projects\u2010using\u2010Shib\/eduRoam\/Radius\u2010SAML\u2010Profile\u2010v2.html.","key":"key2022021019554189100_b4"},{"doi-asserted-by":"crossref","unstructured":"Chadwick, D.W., Otenko, A. and Ball, E. (2003), \u201cRole\u2010based access control with X.509 attribute certificates\u201d, IEEE Internet Computing, Vol. 7 No. 2, pp. 62\u20109.","key":"key2022021019554189100_b5","DOI":"10.1109\/MIC.2003.1189190"},{"doi-asserted-by":"crossref","unstructured":"de Laat, C., Gross, G., Gommans, L., Vollbrecht, J. and Spence, D. (2000), Generic AAA Architecture, Request for Comments (RFC) 2903.","key":"key2022021019554189100_b8","DOI":"10.17487\/rfc2903"},{"unstructured":"ITU\u2010T Recommendation (2000), X.509: The Directory \u2013 Public\u2010Key and Attribute Certificate Frameworks.","key":"key2022021019554189100_b6"},{"unstructured":"Kerver, B., Stanica, M., Rauschenbach, J. and Wierenga, K. (2007), Deliverable DJ5.3.1: Documentation on G\u00c9ANT2 Universal Single Sign\u2010On (uSSO) Requirements.","key":"key2022021019554189100_b7"},{"unstructured":"LAN MAN Standards Committee of the IEEE Computer Society (2001), Standard for Port based Network Access Control, IEEE Draft P802.1X\/D11.","key":"key2022021019554189100_b9"},{"unstructured":"Lopez, D.R., Solberg, A. and Stanica, M. (2006), eduGAIN Profiles and Implementation Guidelines, GN2 JRA5. G\u00c9ANT2.","key":"key2022021019554189100_b10"},{"unstructured":"L\u00f3pez, G., C\u00e1novas, O. and G\u00f3mez\u2010Skarmeta, A.F. (2005), \u201cUse of XACML policies for a network access control service\u201d, Proceedings of 4th International Workshop for Applied PKI (IWAP 05), pp. 111\u2010122.","key":"key2022021019554189100_b12"},{"doi-asserted-by":"crossref","unstructured":"L\u00f3pez, G., C\u00e1novas, O., G\u00f3mez, A.F., Jim\u00e9nez, J.D. and Mar\u00edn, R. (2007), \u201cA network access control approach based on the AAA architecture and authorization attributes\u201d, Journal of Network and Computer Applications (JNCA), Vol. 30 No. 3, pp. 900\u201019.","key":"key2022021019554189100_b11","DOI":"10.1016\/j.jnca.2005.07.010"},{"unstructured":"OASIS (2003), Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1, OASIS Standard.","key":"key2022021019554189100_b13"},{"unstructured":"OASIS (2005), eXtensible Access Control Markup Language (XACML), Version 2.0. OASIS Standard.","key":"key2022021019554189100_b14"},{"unstructured":"Palekar, A., Simon, D., Salowey, J., Zhou, H., Zorn, G. and Josefsson, S. (2004), Protected EAP Protocol (PEAP), IETF Draft.","key":"key2022021019554189100_b15"},{"doi-asserted-by":"crossref","unstructured":"Rigney, C., Willens, S., Rubens, A. and Simpson, W. (2000), Remote Authentication Dial In User Service (RADIUS), Request for Comments (RFC) 2365.","key":"key2022021019554189100_b16","DOI":"10.17487\/rfc2865"},{"unstructured":"SCHAC (2006), Schema for Academia Attribute Definitions for Individual Data Version 1.2.0 4.","key":"key2022021019554189100_b17"},{"doi-asserted-by":"crossref","unstructured":"Scavo, T. and Cantor, S. (2005), Shibboleth Architecture, technical overview.","key":"key2022021019554189100_b18","DOI":"10.26869\/TI.65.1"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240710830181","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240710830181\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240710830181\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:15Z","timestamp":1753400415000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/17\/5\/479-494\/178766"}},"subtitle":[],"editor":[{"given":"Thomas C.","family":"Schmidt","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,10,23]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2007,10,23]]}},"alternative-id":["10.1108\/10662240710830181"],"URL":"https:\/\/doi.org\/10.1108\/10662240710830181","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2007,10,23]]}}}