Secure sharing of Higher Education Achievement Reports (HEARs) at Newcastle University using SMART

We’ve just released a draft version of the “Secure sharing of Higher Education Achievement Reports (HEARs) at Newcastle University using SMART” document. Our goal is to propose improvements to existing processes at Newcastle University and integrate SMART with some of the applications, as discussed. Please feel free to send your feedback.

You can also check out SMART white paper – single page that describes the problems in Higher Education that SMART AM solves.

Categories: Publications, Research

Puma: building a requester application

June 30, 2012 Leave a comment

Here comes the second part of our hands-on introduction to our lovable Python UMA implementation – PUMA. As Part I, it may not be all that brief, but it is wildly comprehensive and grants you the hottest superpower on the market: rapidly creating sleek, UMA-enabled Requester Applications.

Read more…

Categories: Development

Puma: building a host application

April 20, 2012 Leave a comment

What you see here is the first part of our hands-on introduction to our lovable Python UMA implementation. It may not be all that brief, but it is wildly comprehensive and grants you the hottest superpower on the market: rapidly creating sleek, UMA-enabled applications.

Let’s get to work, then.

Read more…

Categories: Development

Releasing Puma.

April 13, 2012 Leave a comment

The time has come. We’re proud to announce that after serving us well internally and powering our sleek host and requester applications, it is time to release Puma – the little beast behind the curtain that you should definitely pay attention to – our Python library for swiftly implementing UMA enabled applications.

As a reference implementation, don’t hesitate to check out both:

Learn more about the flow using SMARTAM by viewing the following two presentations:

All code is released under the Apache 2.0 license.

Categories: Development

The Business of Open Source

December 19, 2011 Leave a comment

“I’ve experienced quite a bit about how open source works. It’s been a wonderful learning experience for me and definitely turned me from someone who thought open source code and developers were somehow not as good as closed source equivalents into a person who knows that the opposite is most definitely the case!”(Mark Little, Red Hat, blog)

Indisputable fact of today’s worlds is an existence of many IT companies that based their success on the Open Source. Talend, Alfresco, Cloudera, Mozilla and last but not least: Red Hat/JBoss (How JBoss did it!) are great examples of that.

Read more…

User eXperience & Trusted Claims for UMA – New presentations!

July 25, 2011 Leave a comment

Our colleague Domenico Catalano has just finished his stay at Newcastle University. During his stay Domenico has given two presentations – one on Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access and the other on Extending the UMA Protocol to support Trusted Claims.

Read more…

Categories: Usability, UX

OAuth 2.0 Implementation in Python

July 23, 2011 1 comment

The SMART team has just released a new OAuth 2.0 implementation in Python. You can find the source code here and the documentation for the library is available here. The library in Python has  been developed entirely by Jacek Szpot (with a little help from the SMART team). Jacek joined SMART around 4 weeks ago and we are very excited about this first release.

The OAuth 2.0 Python library has been released under the Apache 2.0 license and we plan to continue further development. As always, we very much appreciate feedback and we’re open to suggestions on how to make the library better!

Categories: Development

SMART Mobile – Coming Soon!

July 22, 2011 Comments off

Very soon, we are planning to release a mobile version of the SMART Authorization Manager, called SMART Mobile. This application has been designed to work with Android devices (> 1.5) but it will work on iPhone and other smartphones too. Each app user needs to register at and generate the API KEY using the provided API. This API KEY has to be then copied to the settings form of SMART Mobile. This applications allows the user to view a log of access history and access requests on his or her smartphone. This way as an owner of protected resources, you can always track and have more control of your data on the Web.

To obtain an API KEY you need to log into your account at Go to an account page, and generate your API KEY.

Categories: Development, UX

Domenico & Jacek join SMART

We are extremely happy to announce that the SMART Team has 2 new members – Domenico Catalano (Oracle Corp., Italy) and Jacek Szpot (Wroclaw University of Technology, Poland). Domenico’s theoretical knowledge and real-world experience in the areas of security, usability and software development will help with addressing issues and concerns raised in the initial UX study of SMARTAM. Jacek, on the other hand, is gaining experience in the areas of software development and Web security and will help with progressing with development of the UMA/j framework. Stay tuned for more exciting news!

Categories: Uncategorized

SMARTAM with History log and Access Requests log

We have just launched a new release of SMARTAM at Apart from fixing a few bugs, this release comes with two brand new features:

  • History log
  • Access requests log

History log is a list enabling you to see who accessed your resources and when. This way you are given even more control over protection of your resources and you are always able to follow what happens to your data. The other feature – Access requests – is a list of notifications from your friends who have heard about your data (e.g. newly uploaded photos) and have sent you a request to be able to access this data. You can then easily grant access to the requested data (according to your preferences!) instantly as this feature is located in the sidebar on almost all the pages of SMARTAM. This way you will be always sure that you didn’t missed anybody while setting security and privacy settings for your resources! Read more to see example screenshots!

Read more…

Categories: Development, Research, Usability, UX