025.0 Authentication and access management

Your Route: Home > 025 Operations of libraries, archives, information centers > 025.0 Library systems and information technology in libraries > 025.0 Digital libraries and online services > 025.0 Authentication and access management
Sub Category Under This Heading :

025.0 Authentication and access management

025.0 ATHENS Authentication Service System developed by NISS to enable controlled access to subscription services.

025.0 ELib Authentication Concertation Day 10th March 1999 Full text of presentations about some of the issues surrounding authentication, including the Athens authentication system and its implications for electronic or hybrid libraries, as well as alternative and international approaches.

025.0 Findings from the First Stage of the Study into the Requirements for Authentication, Authorisation and Privacy in Higher Education Presents the findings of a consultation exercise to understand the nature and scope of the security requirements within UK higher education.

025.0 Implementing a National Access Management System for Electronic Services Discussion of the issues attached to the implementation of the ATHENS access management system. Points out that the lessons from ATHENS could suggest that success will only be achieved if at least equal attention is paid to the needs of those who will have to manage the final system as to the technical detail.

025.0 Implementing Policies for Access Management Managing access to online information is a broad problem, which occurs in a wide range of different applications. Managers of online information wish to implement policies about who can access the information, under what terms and conditions. This paper describes a general approach to this problem and experience in applying it in digital libraries.

025.0 Recommended Actions for JISC: Results of the Study into the Requirements for Authentication, Authorisation and Privacy in Higher Education Provides recommendations on how JISC might act to improve the security of UK HE networking. Suggests seven necessary actions including, facilitating the development of a support infrastructure for local IT management, encouraging and supporting institutions in the development of network security strategies and defining a common framework for local access schemes.

025.0 Recommended Security Solutions: Results of the Study into the Requirements for Authentication, Authorisation and Privacy in Higher Education. Study undertaken to identify the real, business-led requirements for information security within UK HE, and to recommend solutions or approaches to address those requirements. The findings from the study confirmed the need for institutions to adopt a more substantial information security position and identified security issues covering both management and technical solutions.

025.0 Regaining Single Sign-On Article describing username and password problems for computer users and support staff, caused by the growth of networked dataset providers. Problems are discussed in relation to security and interworking between authentication domains.

025.0 Remote Authentication and Authorization for JSTOR Article which examines four alternative solutions to the problems and requirements of authentication of access to networked information resources: Mechanical Proxies, Application Proxies, Credential Based approaches, and a Proxy/Credential Hybrid. It concludes that campuses must establish authentication schemes, and that successful schemes will be able to mask their complexity from users.

025.0 Safeguarding Digital Library Contents and Users: Digital Watermarking Examination of digital watermarking looking at applications and explaining different techniques including visible image watermarks, reversible visible watermarks, fragile image watermarks and robust image watermarks.

025.0 Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels Article which contrasts two technologies: secure connections and secure packages, which allow transactions to take place between content owners and users. Concludes that secure packages are more appropriate to digital library requirements.

025.0 Technologies to Support Authentication in Higher Education Study of the technologies available to support authentication, reviews the needs expressed by a set of people contacted for the study, and provides the beginnings of a road-map on how a national system might be established.

025.0 UCCAP: University of California Common Authentication Project A collection of documents from a project which is working to provide a certificate / public key infrastructure that will meet authentication needs of all the campuses of the University of Califronia.

025.0 White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources Document released in April 1998 which aims to identify current issues in authentication and to provide a framework for analyzing them, to map out the various best-practice approaches to solving these problems using existing and emerging technology, to provide a common vocabulary and framework to assist in the development of licensing and resource-sharing agreements, and to highlight technical and policy considerations that need to be addressed as part of these business negotiations.

025.0 X509 Digital Certificate Strand Article offering explanations of key concepts, details on using Sun’s Java Web Server to press digital certificates for use with Netscape Web browsers, and a discussion of progress required to develop digital certificates which could manage computer access effectively. The content of a digital certificate is covered, along with issuing policies.

Click Here to Go to the Top of the Page