Access and identity management for libraries : controlling access to online information /
This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss.
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
London :
Facet,
2014.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Title page; Contents; Foreword; Acknowledgements; Note to readers; Glossary; 1 What is access management, and why do libraries do it?; Historical role of libraries in managing access to information; The role of libraries in the 21st century; The history of access management of online information resources; The role of e-commerce in library access management; The 'birth' of access management principles
- Clifford Lynch's white paper; References; 2 Electronic resources: public and not so public; Managing access to electronic collections; How and where users may want to access e-resources.
- What needs to be protected, and whyCommercially produced resources that need to be protected; Publicly available information that may also require access management; Publishers and licensing issues; Library management of licences; Summary; References; 3 Principles and definitions of identity and access management; Introduction; Managing access? ... or identities? ... or both?; The business relationships; The processes of identity and access management; Identifying the person using a resource
- or not; Obligations to protect personal data about users; Summary; References.
- 4 Current access management technologiesIP address; Barcode patterns; Proxy servers; Shared passwords; User registration with publishers; Federated access; Summary; 5 Authentication technologies; 'Something you know, something you have, or something you are'; Authentication technologies overview; Authentication by third parties; Choosing an authentication system; Summary; References; 6 Authorization based on physical location: how does the internet know where I am?; Introduction; Domains and domain names; (How) is all this governed?; IP addresses; IP spoofing.
- Benefits and problems of using IP address-based licensingSummary; References; 7 Authorization based on user identity or affiliation with a library: who you are? Or what you do?; Basing access on identity, or on affiliation with a library; Role-based authorization; Matching roles against licence conditions; Benefits of role-based authorization; Summary; References; 8 Federated access: history, current position and future developments; Single sign-on and the origins of federated access management; The development of standards; Federated access in academia; The future of federated access.