Description |
1 online resource (xx, 248 pages) : illustrations |
Bibliography |
Includes bibliographical references and index. |
Note |
Print version record. |
Contents |
Title page; Contents; Foreword; Acknowledgements; Note to readers; Glossary; 1 What is access management, and why do libraries do it?; Historical role of libraries in managing access to information; The role of libraries in the 21st century; The history of access management of online information resources; The role of e-commerce in library access management; The 'birth' of access management principles -- Clifford Lynch's white paper; References; 2 Electronic resources: public and not so public; Managing access to electronic collections; How and where users may want to access e-resources. |
|
What needs to be protected, and whyCommercially produced resources that need to be protected; Publicly available information that may also require access management; Publishers and licensing issues; Library management of licences; Summary; References; 3 Principles and definitions of identity and access management; Introduction; Managing access? ... or identities? ... or both?; The business relationships; The processes of identity and access management; Identifying the person using a resource -- or not; Obligations to protect personal data about users; Summary; References. |
|
4 Current access management technologiesIP address; Barcode patterns; Proxy servers; Shared passwords; User registration with publishers; Federated access; Summary; 5 Authentication technologies; 'Something you know, something you have, or something you are'; Authentication technologies overview; Authentication by third parties; Choosing an authentication system; Summary; References; 6 Authorization based on physical location: how does the internet know where I am?; Introduction; Domains and domain names; (How) is all this governed?; IP addresses; IP spoofing. |
|
Benefits and problems of using IP address-based licensingSummary; References; 7 Authorization based on user identity or affiliation with a library: who you are? Or what you do?; Basing access on identity, or on affiliation with a library; Role-based authorization; Matching roles against licence conditions; Benefits of role-based authorization; Summary; References; 8 Federated access: history, current position and future developments; Single sign-on and the origins of federated access management; The development of standards; Federated access in academia; The future of federated access. |
Summary |
This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. |
Subject |
Electronic information resources -- Access control.
|
|
Library administration.
|
|
Collection management (Libraries)
|
|
LANGUAGE ARTS & DISCIPLINES -- Library & Information Science -- General.
|
|
Bibliothèques.
|
|
Bibliothèque électronique.
|
|
Accès à l'information.
|
|
Fournisseurs d'accès.
|
|
Utilisateurs d'information.
|
|
Données statistiques.
|
|
Etudes de cas.
|
|
Great Britain.
|
|
Etats-Unis d'Amérique.
|
|
Collection management (Libraries) (OCoLC)fst00867188
|
|
Electronic information resources -- Access control.
(OCoLC)fst00907296
|
|
Library administration. (OCoLC)fst00997606
|
Added Author |
McLeish, Simon, author.
|
|
Paschoud, John, author.
|
Other Form: |
Print version: Garibyan, Masha. Access and identity management for libraries 9781856045889 (OCoLC)864068014 |
ISBN |
9781783300006 (electronic bk.) |
|
1783300000 (electronic bk.) |
|