{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:36:01Z","timestamp":1729661761996,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/issa.2014.6950495","type":"proceedings-article","created":{"date-parts":[[2014,11,12]],"date-time":"2014-11-12T22:09:30Z","timestamp":1415830170000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Concerns regarding service authorization by IP address using eduroam"],"prefix":"10.1109","author":[{"given":"Luzuko","family":"Tekeni","sequence":"first","affiliation":[]},{"given":"Kerry-Lynn","family":"Thomson","sequence":"additional","affiliation":[]},{"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IEMC.2006.4279889"},{"key":"22","article-title":"Shibboleth architecture draft v05","volume":"2","author":"erdos","year":"2002","journal-title":"Internet2 IMACE"},{"journal-title":"Design of Sla Management Framework with Case","year":"2005","author":"yau","key":"17"},{"key":"23","article-title":"Assertions and protocols for the oasis security assertion markup language","author":"cantor","year":"2005","journal-title":"OASIS Standard"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1108\/13590791311287337"},{"key":"15","first-page":"1","article-title":"Protected core networking (pcn): Pcn qos and sla definition","author":"schutz","year":"2013","journal-title":"Military Communications and Iriformation Systems Coriference (MCC) 2013 IEEE"},{"key":"16","article-title":"Service level agreement requirements of an accountingdriven computational grid","author":"sandholm","year":"2005","journal-title":"Royal Institute of Technology Stockholm Sweden Tech Rep TRlTA-NA-0533"},{"key":"13","article-title":"Extensible authentication protocol (eap)","author":"aboba","year":"2004","journal-title":"RFC 3748 June Tech Rep"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSS.2010.5577788"},{"journal-title":"Eduroam Compliance Statement","year":"2011","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2865"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.10089"},{"key":"3","article-title":"Deliverable dj5 1.4: Inter-nren roaming architecture: Description and development items","volume":"2","author":"wierenga","year":"2006","journal-title":"GN2 lRA5 GEANT"},{"journal-title":"Proactive Risk Management Controlling Uncertainty in Product Development 2002","year":"0","author":"smith","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2010.25"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.12921\/cmst.2005.11.02.169-173"},{"journal-title":"Eduroam (N d) Where Can i Eduroam?","year":"0","key":"10"},{"journal-title":"Eduroam (N d) about Eduroam","year":"0","key":"7"},{"journal-title":"TERENA (2012) Eduroam Celebrates A Decade of Providing Secure Roaming Internet Access for Users","year":"0","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1108\/10662240710830181","article-title":"Deploying authorisation mechanisms for federated services in eduroam (dame)","volume":"17","author":"canovas","year":"2007","journal-title":"Internet Research"},{"journal-title":"Deliverable DS5 1 1 Eduroam Service Definition and Implementation Plan","year":"2008","author":"milinovic","key":"4"},{"journal-title":"TERENA 2004 Eduroam Goes Global","year":"0","key":"9"},{"journal-title":"Terena Annual Report 2003","year":"2003","author":"olesen","key":"8"}],"event":{"name":"2014 Information Security for South Africa (ISSA)","start":{"date-parts":[[2014,8,13]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2014,8,14]]}},"container-title":["2014 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6940061\/6950479\/06950495.pdf?arnumber=6950495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T20:05:09Z","timestamp":1498161909000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6950495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/issa.2014.6950495","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}