PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all standards put forth by CNSS 4011 & 4013A! Access control protects resources against unauthorized viewing, tampering, or destruction. These systems serve as a primary means of ensuring privacy, conf
Access and identity management for libraries : controlling access to online information
β Scribed by Garibyan, Masha; McLeish, Simon; Paschoud, John
- Publisher
- Facet Publishing
- Year
- 2014
- Tongue
- English
- Leaves
- 273
- Series
- Facet Publications (All Titles as Published)
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. This practical book is the first to explain the principles behind access management, the available technologies and how they work. It provides detailed case studies describing how access management is being implemented at organizational and national levels in the USA and Europe, and serves as a practical guide to the resources available to help plan, implement and operate access management in libraries
β¦ Table of Contents
Content: Title page
Contents
Foreword
Acknowledgements
Note to readers
Glossary
1 What is access management, and why do libraries do it?
Historical role of libraries in managing access to information
The role of libraries in the 21st century
The history of access management of online information resources
The role of e-commerce in library access management
The 'birth' of access management principles --
Clifford Lynch's white paper
References
2 Electronic resources: public and not so public
Managing access to electronic collections
How and where users may want to access e-resources. What needs to be protected, and whyCommercially produced resources that need to be protected
Publicly available information that may also require access management
Publishers and licensing issues
Library management of licences
Summary
References
3 Principles and definitions of identity and access management
Introduction
Managing access? ... or identities? ... or both?
The business relationships
The processes of identity and access management
Identifying the person using a resource --
or not
Obligations to protect personal data about users
Summary
References. 4 Current access management technologiesIP address
Barcode patterns
Proxy servers
Shared passwords
User registration with publishers
Federated access
Summary
5 Authentication technologies
'Something you know, something you have, or something you are'
Authentication technologies overview
Authentication by third parties
Choosing an authentication system
Summary
References
6 Authorization based on physical location: how does the internet know where I am?
Introduction
Domains and domain names
(How) is all this governed?
IP addresses
IP spoofing. Benefits and problems of using IP address-based licensingSummary
References
7 Authorization based on user identity or affiliation with a library: who you are? Or what you do?
Basing access on identity, or on affiliation with a library
Role-based authorization
Matching roles against licence conditions
Benefits of role-based authorization
Summary
References
8 Federated access: history, current position and future developments
Single sign-on and the origins of federated access management
The development of standards
Federated access in academia
The future of federated access.
β¦ Subjects
Electronic information resources -- Access control. Library administration. Collection management (Libraries) LANGUAGE ARTS & DISCIPLINES -- Library & Information Science -- General. BibliotheΜques. BibliotheΜque eΜlectronique. AcceΜs aΜ l'information. Fournisseurs d'acceΜs. Utilisateurs d'information. DonneΜes statistiques
π SIMILAR VOLUMES
The National Assessment of Educational Progress (NAEP) arts education framework is founded on a vision of a society that believes the arts are essential to every child's complete development. Throughout their lives, they will draw from artistic experience and knowledge as a means of understanding wh
<p><P><STRONG>Access Control Systems: Security, Identity Management and Trust Models</STRONG> provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access cont
Not much to say on this book except that I found it incomplete and lacking in practical processes, more studious than application oriented. I have read better books on the subject like the IAM Success Tips: Volume 1 which offers a lot more strategical information since it is more of a guide than an
This book contains a plethora of different viewpoints and research results from all over the world, bringing them together to provide a global perspective on the various issues that comprise 'open access'. Topics include copyright, best practices and management, open access and society, repositories
<p>This book contains a plethora of different viewpoints and research results from all over the world, bringing them together to provide a global perspectiveon the various issues that comprise "open access". Topics include copyright, best practices and management, open access and society, repositori