skip to content
Access and identity management for libraries. Controlling access to online information. Preview this item
ClosePreview this item
Checking...

Access and identity management for libraries. Controlling access to online information.

Publisher: London : Facet Publishing 2013.
Edition/Format:   Print book : English
Summary:
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. This practical book is the first to explain the principles behind access management, the available technologies and how they work. It provides detailed case studies describing how access management is being implemented at organizational and national levels in the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
ISBN: 9781856045889 1856045889
OCLC Number: 844731162
Description: 192 pages
Contents: Foreword - Clifford Lynch 1. What is access management and why do libraries do it? Historical role of libraries in managing access to informationThe role of libraries in the 21st centuryThe history of access management of online information resourcesThe role of e-commerce in library access managementThe 'birth' of access management principles - Clifford Lynch's white paper 2. Electronic resources: public and not so public Managing access to electronic collectionsHow and where users may want to access e-resourcesWhat needs to be protected, and whyCommercially produced resources that need to be protectedPublicly available information that may also require access managementPublishers and licensing issuesLibrary management of licencesSummaryReferences 3. Principles and definitions of identity and access management IntroductionManaging access? . . . or identities? . . . or both?The business relationshipsThe processes of identity and access managementIdentifying the person using a resource - or notObligations to protect personal data about usersSummaryReferences 4. Current access management technologies IP addressBarcode patternsProxy serversShared passwordsUser registration with publishersFederated accessSummary 5. Authentication technologies 'Something you know, something you have, or something you are'Authentication technologies overviewAuthentication by third partiesChoosing an authentication system 6. Authorization based on physical location: how does the internet know where I am? IntroductionDomains and domain names(How) is all this governed?IP addressesIP spoofingBenefits and problems of using IP address-based licensingSummaryReferences 7. Authorization based on user identity or affiliation with a library: who you are? or what you do? Basing access on identity, or on affiliation with a libraryRole-based authorizationMatching roles against licence conditionsBenefits of role-based authorizationSummaryReferences 8. Federated access: history, current position and future developments Single sign-on and the origins of federated access managementThe development of standardsFederated access in academiaFuture of federated accessReferences 9. How to choose access management and identity management products and services IntroductionIdentity management and access management solution capabilitiesEstablishing requirements with suppliersAsserting library requirements in a wider-scale system procurementImplementation optionsThe range of access and identity management productsConclusionReferences 10. Internet access provided by (or in) libraries IntroductionWired accessWireless accessPublic access issuesSummaryReferences 11. Library statistics Why libraries collect electronic resource usage statisticsChallenges in collecting electronic resource usage dataHow libraries collect usage dataConcluding thoughtsReferences 12. The business case for libraries IntroductionKey benefits of quality identity managementDesigning an IdM projectPutting together a business caseConclusionReferences and further reading Afterword References Appendix 1: Case studies Extending access management to business and community engagement activities at Kidderminster College, UKMoving from Athens to Shibboleth at University College London, UKOnline reciprocal borrowing registration for Western Australian University LibrariesLibrary and IT collaboration: driving strategic improvements to identity and access management practices and capabilitiesManaging affiliated users with federated identity management at UNC-Chapel Hill, USATilburg University and the SURFfederatie, the NetherlandsDelivering access to resources in a joint academic and public library buildingSingle sign-on across the USMAI Consortium, USA Appendix 2: A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources
Responsibility: Masha Garibyan; John Paschoud.

Abstract:

This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss.  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"...very useful to librarians, publishers and information technologists trying to gain insight into the complexities surrounding access to licensed networked information resources in settings such as Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/844731162<\/a>> # Access and identity management for libraries. Controlling access to online information.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"844731162<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/enk<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/dbpedia.org\/resource\/London<\/a>> ; # London<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/classification\/Z665-720<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/020\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2012<\/span>\" ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2013<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. This practical book is the first to explain the principles behind access management, the available technologies and how they work. It provides detailed case studies describing how access management is being implemented at organizational and national levels in the USA and Europe, and serves as a practical guide to the resources available to help plan, implement and operate access management in libraries.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/8912792669<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Access and identity management for libraries. Controlling access to online information.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"844731162<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/844731162#PublicationEvent\/london_facet_publishing2013<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8912792669#Agent\/facet_publishing<\/a>> ; # Facet Publishing<\/span>\n\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781856045889<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/844731162<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dbpedia.org\/resource\/London<\/a>> # London<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"London<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dewey.info\/class\/020\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8912792669#Agent\/facet_publishing<\/a>> # Facet Publishing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Facet Publishing<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/classification\/Z665-720<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/enk<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"enk<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781856045889<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1856045889<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781856045889<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/844731162<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/844731162<\/a>> ; # Access and identity management for libraries. Controlling access to online information.<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-02-16<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n