By Masha Garibyan, Simon McLeish, John Paschoud
With the swift bring up within the use of digital assets in libraries, coping with entry to on-line info is a space many librarians fight with. This useful booklet is the 1st to provide an explanation for the rules at the back of entry administration, the on hand applied sciences and the way they paintings. It offers designated case stories describing how entry administration is being applied at organizational and nationwide degrees within the united states and Europe, and serves as a realistic advisor to the assets to be had to assist plan, enforce and function entry administration in libraries
Read Online or Download Access and identity management for libraries : controlling access to online information PDF
Similar library management books
This is every thing you want to plan, execute, and verify college library occasions. other than emphasizing the advantages of powerful courses, the authors supply info on offering help providers to counterpoint programming. a number of examples of profitable courses from around the state give you the valuable notion to create your individual imaginitive and remarkable events-events that inspire younger scholars to completely reap the benefits of media middle assets.
ITIL model 3's (V3) provider lifecycle-based perform comprises the easiest of V1 and V2 and exams present most sensible perform for ITSM. carrier Operation introduces, explains and info supply and keep an eye on actions to accomplish operational excellence on a day by day foundation. Readers will locate a few of the known procedures from the previous carrier help and repair supply books, which were up to date the place beneficial.
Presents a large scope for examine to take the disappointment out of now not with the ability to find what you will want, not only through kingdom or zone, yet tips on how to pinpoint and entry trustworthy info on an international scale. different concerns addressed are Know-Your-Customer concerns, corruption and terrorism and new internet 2.
Info Consulting provides a more in-depth examine what makes info experts profitable and the way they enhance a efficient courting with their consumers. whereas many of the books in this topic zone are supplying the studies of data consulting veterans on 'how do you actually do it? ', the purpose of this ebook is targeted on exploring the character of data administration consulting.
- Conducting Action Research to Evaluate Your School Library
- Regional Approaches to Water Pollution in the Environment
- Cross-Cultural Perspectives on Knowledge Management (Libraries Unlimited Knowledge Management Series)
- Dealing With Difficult People in the Library
Additional info for Access and identity management for libraries : controlling access to online information
Some commercial ERMs are tied to additional services provided by that company. Maria Collins has produced two excellent articles (2005, 2008) that give a detailed overview of some of the commercial ERMs available today and selection criteria for choosing an ERM. The commercial systems design is largely based on the ERM requirements established by the Digital Library Federation’s Electronic Management Initiative (Digital Library Federation, 2004). While the DLF guidelines have given invaluable assistance to commercial ERM developers, it is still important to evaluate each potential ERM very carefully to make sure it fits closely with the local requirements.
There may be Garibyan et al. Access & identity TEXT PROOF 04 07/10/2013 14:01 Page 27 PRINCIPLES AND DEFINITIONS OF IDENTITY AND ACCESS MANAGEMENT 27 several possible ‘levels of assurance’ (EDUCAUSE, 2007) of user authentication, giving greater or lesser certainty of the identity of the user. Different levels typically require different kinds of credential, and the registration process needed to obtain credentials which give a higher level of assurance is typically more onerous. Authorization Having established (to an appropriate level of certainty) that an online user is indeed the individual they claim to be, authorization is the process of determining whether this individual should have access to this resource.
Some resources require the user to get in touch with the library to request an individual password in order to access the resource. g. whether or not the use of a proxy, a technology described in Chapter 4, is allowed). Sometimes a resource is available from different suppliers, each imposing different access conditions. The list of examples can be continued. Licence terms standardization A lot of work has been done on licence terms standardization but there is still more that needs to be done.
Access and identity management for libraries : controlling access to online information by Masha Garibyan, Simon McLeish, John Paschoud