Cargando…

Access and identity management for libraries : controlling access to online information /

This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Garibyan, Masha (Autor), McLeish, Simon (Autor), Paschoud, John (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Facet, 2014.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Title page; Contents; Foreword; Acknowledgements; Note to readers; Glossary; 1 What is access management, and why do libraries do it?; Historical role of libraries in managing access to information; The role of libraries in the 21st century; The history of access management of online information resources; The role of e-commerce in library access management; The 'birth' of access management principles
  • Clifford Lynch's white paper; References; 2 Electronic resources: public and not so public; Managing access to electronic collections; How and where users may want to access e-resources.
  • What needs to be protected, and whyCommercially produced resources that need to be protected; Publicly available information that may also require access management; Publishers and licensing issues; Library management of licences; Summary; References; 3 Principles and definitions of identity and access management; Introduction; Managing access? ... or identities? ... or both?; The business relationships; The processes of identity and access management; Identifying the person using a resource
  • or not; Obligations to protect personal data about users; Summary; References.
  • 4 Current access management technologiesIP address; Barcode patterns; Proxy servers; Shared passwords; User registration with publishers; Federated access; Summary; 5 Authentication technologies; 'Something you know, something you have, or something you are'; Authentication technologies overview; Authentication by third parties; Choosing an authentication system; Summary; References; 6 Authorization based on physical location: how does the internet know where I am?; Introduction; Domains and domain names; (How) is all this governed?; IP addresses; IP spoofing.
  • Benefits and problems of using IP address-based licensingSummary; References; 7 Authorization based on user identity or affiliation with a library: who you are? Or what you do?; Basing access on identity, or on affiliation with a library; Role-based authorization; Matching roles against licence conditions; Benefits of role-based authorization; Summary; References; 8 Federated access: history, current position and future developments; Single sign-on and the origins of federated access management; The development of standards; Federated access in academia; The future of federated access.