Description |
1 online resource (xx, 248 pages) : illustrations |
Contents |
Title page; Contents; Foreword; Acknowledgements; Note to readers; Glossary; 1 What is access management, and why do libraries do it?; Historical role of libraries in managing access to information; The role of libraries in the 21st century; The history of access management of online information resources; The role of e-commerce in library access management; The 'birth' of access management principles -- Clifford Lynch's white paper; References; 2 Electronic resources: public and not so public; Managing access to electronic collections; How and where users may want to access e-resources |
|
What needs to be protected, and whyCommercially produced resources that need to be protected; Publicly available information that may also require access management; Publishers and licensing issues; Library management of licences; Summary; References; 3 Principles and definitions of identity and access management; Introduction; Managing access? ... or identities? ... or both?; The business relationships; The processes of identity and access management; Identifying the person using a resource -- or not; Obligations to protect personal data about users; Summary; References |
|
4 Current access management technologiesIP address; Barcode patterns; Proxy servers; Shared passwords; User registration with publishers; Federated access; Summary; 5 Authentication technologies; 'Something you know, something you have, or something you are'; Authentication technologies overview; Authentication by third parties; Choosing an authentication system; Summary; References; 6 Authorization based on physical location: how does the internet know where I am?; Introduction; Domains and domain names; (How) is all this governed?; IP addresses; IP spoofing |
|
Benefits and problems of using IP address-based licensingSummary; References; 7 Authorization based on user identity or affiliation with a library: who you are? Or what you do?; Basing access on identity, or on affiliation with a library; Role-based authorization; Matching roles against licence conditions; Benefits of role-based authorization; Summary; References; 8 Federated access: history, current position and future developments; Single sign-on and the origins of federated access management; The development of standards; Federated access in academia; The future of federated access |
Summary |
This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Electronic information resources -- Access control.
|
|
Library administration.
|
|
Collection management (Libraries)
|
|
collections management.
|
|
LANGUAGE ARTS & DISCIPLINES -- Library & Information Science -- General.
|
|
Bibliothèques.
|
|
Bibliothèque électronique.
|
|
Accès à l'information.
|
|
Fournisseurs d'accès.
|
|
Utilisateurs d'information.
|
|
Données statistiques.
|
|
Etudes de cas.
|
|
Collection management (Libraries)
|
|
Electronic information resources -- Access control
|
|
Library administration
|
|
Royaume-Uni.
|
|
Etats-Unis d'Amérique.
|
Form |
Electronic book
|
Author |
McLeish, Simon, author
|
|
Paschoud, John, author
|
ISBN |
9781783300006 |
|
1783300000 |
|