025.0 ELib
Authentication Concertation Day 10th March 1999
Full text of presentations about some of the issues surrounding
authentication, including the Athens authentication system and its
implications for electronic or hybrid libraries, as well as alternative
and international approaches.
025.0 Findings
from the First Stage of the Study into the Requirements for
Authentication, Authorisation and Privacy in Higher Education
Presents the findings of a consultation exercise to understand the
nature and scope of the security requirements within UK higher
education.
025.0 Implementing
a National Access Management System for Electronic Services
Discussion of the issues attached to the implementation of the
ATHENS access management system. Points out that the lessons from ATHENS
could suggest that success will only be achieved if at least equal
attention is paid to the needs of those who will have to manage the
final system as to the technical detail.
025.0 Implementing
Policies for Access Management
Managing access to online information is a broad problem, which
occurs in a wide range of different applications. Managers of online
information wish to implement policies about who can access the
information, under what terms and conditions. This paper describes a
general approach to this problem and experience in applying it in
digital libraries.
025.0 Recommended
Actions for JISC: Results of the Study into the Requirements for
Authentication, Authorisation and Privacy in Higher Education
Provides recommendations on how JISC might act to improve the
security of UK HE networking. Suggests seven necessary actions
including, facilitating the development of a support infrastructure for
local IT management, encouraging and supporting institutions in the
development of network security strategies and defining a common
framework for local access schemes.
025.0 Recommended
Security Solutions: Results of the Study into the Requirements for
Authentication, Authorisation and Privacy in Higher Education.
Study undertaken to identify the real, business-led requirements for
information security within UK HE, and to recommend solutions or
approaches to address those requirements. The findings from the study
confirmed the need for institutions to adopt a more substantial
information security position and identified security issues covering
both management and technical solutions.
025.0 Regaining
Single Sign-On
Article describing username and password problems for computer users
and support staff, caused by the growth of networked dataset providers.
Problems are discussed in relation to security and interworking between
authentication domains.
025.0 Remote
Authentication and Authorization for JSTOR
Article which examines four alternative solutions to the problems
and requirements of authentication of access to networked information
resources: Mechanical Proxies, Application Proxies, Credential Based
approaches, and a Proxy/Credential Hybrid. It concludes that campuses
must establish authentication schemes, and that successful schemes will
be able to mask their complexity from users.
025.0 Safeguarding
Digital Library Contents and Users: Digital Watermarking
Examination of digital watermarking looking at applications and
explaining different techniques including visible image watermarks,
reversible visible watermarks, fragile image watermarks and robust image
watermarks.
025.0 Safeguarding
Digital Library Contents and Users: Protecting Documents Rather Than
Channels
Article which contrasts two technologies: secure connections and
secure packages, which allow transactions to take place between content
owners and users. Concludes that secure packages are more appropriate to
digital library requirements.
025.0 Technologies
to Support Authentication in Higher Education
Study of the technologies available to support authentication,
reviews the needs expressed by a set of people contacted for the study,
and provides the beginnings of a road-map on how a national system might
be established.
025.0 UCCAP: University of
California Common Authentication Project
A collection of documents from a project which is working to provide
a certificate / public key infrastructure that will meet authentication
needs of all the campuses of the University of Califronia.
025.0 White
Paper on Authentication and Access Management Issues in
Cross-organizational Use of Networked Information Resources
Document released in April 1998 which aims to identify current
issues in authentication and to provide a framework for analyzing them,
to map out the various best-practice approaches to solving these
problems using existing and emerging technology, to provide a common
vocabulary and framework to assist in the development of licensing and
resource-sharing agreements, and to highlight technical and policy
considerations that need to be addressed as part of these business
negotiations.
025.0 X509
Digital Certificate Strand
Article offering explanations of key concepts, details on using
Sun’s Java Web Server to press digital certificates for use with
Netscape Web browsers, and a discussion of progress required to develop
digital certificates which could manage computer access effectively. The
content of a digital certificate is covered, along with issuing
policies.