Access and identity management for libraries: controlling access to online information
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Facet
2014
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XX, 248 S. Ill., graph. Darst. |
ISBN: | 9781856045889 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035758135 | ||
003 | DE-604 | ||
005 | 20140212 | ||
007 | t | ||
008 | 091007s2014 ad|| |||| 00||| eng d | ||
015 | |a 013-43825 |2 dnb | ||
020 | |a 9781856045889 |c pbk. |9 978-1-85604-588-9 | ||
035 | |a (OCoLC)254897758 | ||
035 | |a (DE-599)BVBBV035758135 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-11 |a DE-12 | ||
082 | 0 | |a 025.344 | |
084 | |a AN 77300 |0 (DE-625)6312: |2 rvk | ||
084 | |a 24,1 |2 ssgn | ||
100 | 1 | |a Garibyan, Masha |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1044298782 |4 aut | |
245 | 1 | 0 | |a Access and identity management for libraries |b controlling access to online information |c Masha Garibyan, Simon McLeish and John Paschoud |
250 | |a 1. publ. | ||
264 | 1 | |a London |b Facet |c 2014 | |
300 | |a XX, 248 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Collection management (Libraries) | |
650 | 4 | |a Electronic information resources / Access control | |
650 | 4 | |a Library administration | |
650 | 4 | |a Electronic information resources - Access control | |
650 | 4 | |a Collection management (Libraries) | |
650 | 4 | |a Electronic information resources / Access control | |
650 | 4 | |a Library administration | |
650 | 0 | 7 | |a Elektronische Medien |0 (DE-588)4151918-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Benutzung |0 (DE-588)4144483-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bibliothek |0 (DE-588)4006439-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Bibliothek |0 (DE-588)4006439-6 |D s |
689 | 0 | 1 | |a Benutzung |0 (DE-588)4144483-8 |D s |
689 | 0 | 2 | |a Elektronische Medien |0 (DE-588)4151918-8 |D s |
689 | 0 | 3 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a McLeish, Simon |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1044298871 |4 aut | |
700 | 1 | |a Paschoud, John |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1044298928 |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018618063&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018618063 | ||
942 | 1 | 1 | |c 025.1 |e 22/bsb |
942 | 1 | 1 | |c 025.3 |e 22/bsb |
Datensatz im Suchindex
_version_ | 1804140680273985536 |
---|---|
adam_text | Titel: Access and identity management for libraries
Autor: Garibyan, Masha
Jahr: 2014
Contents
Foreword Clifford Lynch..........................................................................ix
Acknowledgements...............................................................................xiii
Note to readers........................................................................................xv
Glossary..................................................................................................xvii
1 What is access management, and why do libraries do it?..............1
Historical role of libraries in managing access to information.............................1
The role of libraries in the 21st century..............................................................2
The history of access management of online information resources....................4
The role of e-commerce in library access management.......................................5
The birth of access management principles - Clifford Lynch s white paper........6
References..........................................................................................................7
2 Electronic resources: public and not so public..................................9
Managing access to electronic collections...........................................................9
How and where users may want to access e-resources.....................................10
What needs to be protected, and why.............................................................11
Commercially produced resources that need to be protected...........................12
Publicly available information that may also require access management..........14
Publishers and licensing issues.........................................................................15
Library management of licences.......................................................................17
Summary..........................................................................................................19
References........................................................................................................19
3 Principles and definitions of identity and access management......21
Introduction.....................................................................................................21
Managing access? ... or identities? ... or both?............................................22
The business relationships................................................................................23
The processes of identity and access management...........................................24
Identifying the person using a resource - or not...............................................27
Obligations to protect personal data about users..............................................28
Summary..........................................................................................................28
References........................................................................................................29
4 Current access management technologies.....................................31
IP address.........................................................................................................31
Barcode patterns..............................................................................................33
Proxy servers.....................................................................................................33
Shared passwords............................................................................................34
User registration with publishers.......................................................................35
Federated access..............................................................................................36
Summary..........................................................................................................37
5 Authentication technologies............................................................39
Something you know, something you have, or something you are .................39
Authentication technologies overview..............................................................40
Authentication by third parties.........................................................................49
Choosing an authentication system..................................................................50
Summary..........................................................................................................51
References........................................................................................................52
6 Authorization based on physical location: how does the
internet know where I am?.............................................................55
Introduction.....................................................................................................55
Domains and domain names............................................................................55
(How) is all this governed?...............................................................................56
IP addresses......................................................................................................58
IP spoofing.......................................................................................................65
Benefits and problems of using IP address-based licensing...............................66
Summary..........................................................................................................66
References........................................................................................................66
7 Authorization based on user identity or affiliation with a
library: who you are? Or what you do?.........................................69
Basing access on identity, or on affiliation with a library...................................69
Role-based authorization..................................................................................71
Matching roles against licence conditions.........................................................75
Benefits of role-based authorization.................................................................76
Summary..........................................................................................................79
References........................................................................................................79
8 Federated access: history, current position and future
developments....................................................................................81
Single sign-on and the origins of federated access management......................81
The development of standards.........................................................................83
Federated access in academia...........................................................................85
The future of federated access.........................................................................93
Summary..........................................................................................................94
References........................................................................................................95
9 How to choose access management and identity management
products and services.......................................................................99
Introduction ....................................................................................................99
Identity management and access management solution capabilities...............101
Establishing requirements with suppliers.........................................................102
Asserting library requirements in a wider-scale system procurement...............106
Implementation options..................................................................................108
The range of access and identity management products................................110
Conclusions...................................................................................................110
References......................................................................................................111
10 Internet access provided by (or in) libraries.................................113
Introduction...................................................................................................113
Wired access..................................................................................................117
Wireless access...............................................................................................118
Public access issues.........................................................................................121
Summary........................................................................................................125
References......................................................................................................125
11 Library statistics..............................................................................127
Why libraries collect electronic resource usage statistics..................................127
Challenges in collecting electronic resource usage data..................................128
How libraries collect usage data.....................................................................130
Concluding thoughts......................................................................................134
References and further reading......................................................................135
12 The business case for libraries......................................................139
Introduction...................................................................................................139
Key benefits of quality identity management..................................................143
Designing an IdM project...............................................................................145
Putting together a business case....................................................................150
Conclusions....................................................................................................153
References and further reading......................................................................154
Afterword..............................................................................................155
References......................................................................................................157
Appendix 1: Case studies......................................................................159
Extending access management to business and community engagement
activities at Kidderminster College, UK....................................................160
Moving from Athens to Shibboleth at University College London, UK ...........163
Online reciprocal borrowing registration for Western Australian University
Libraries..................................................................................................167
Library and IT collaboration: driving strategic improvements to identity and
access management practices and capabilities.........................................172
Managing affiliated users with federated identity management at
UNC-Chapel Hill, USA.............................................................................182
Tilburg University and the SURFfederatie, the Netherlands..............................186
Delivering access to resources in a joint academic and public library
building, UK............................................................................................190
Single sign-on across the USMAI Consortium, USA.........................................194
Appendix 2: A White Paper on Authentication and Access
Management Issues in Cross-organizational Use of Networked
Information Resources Clifford Lynch, editor..............................201
Index
.237
|
any_adam_object | 1 |
author | Garibyan, Masha ca. 20./21. Jh McLeish, Simon ca. 20./21. Jh Paschoud, John ca. 20./21. Jh |
author_GND | (DE-588)1044298782 (DE-588)1044298871 (DE-588)1044298928 |
author_facet | Garibyan, Masha ca. 20./21. Jh McLeish, Simon ca. 20./21. Jh Paschoud, John ca. 20./21. Jh |
author_role | aut aut aut |
author_sort | Garibyan, Masha ca. 20./21. Jh |
author_variant | m g mg s m sm j p jp |
building | Verbundindex |
bvnumber | BV035758135 |
classification_rvk | AN 77300 |
ctrlnum | (OCoLC)254897758 (DE-599)BVBBV035758135 |
dewey-full | 025.344 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 025 - Operations of libraries and archives |
dewey-raw | 025.344 |
dewey-search | 025.344 |
dewey-sort | 225.344 |
dewey-tens | 020 - Library and information sciences |
discipline | Allgemeines |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02348nam a2200565 c 4500</leader><controlfield tag="001">BV035758135</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140212 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">091007s2014 ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">013-43825</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781856045889</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-85604-588-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)254897758</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035758135</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-12</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">025.344</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AN 77300</subfield><subfield code="0">(DE-625)6312:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Garibyan, Masha</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1044298782</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Access and identity management for libraries</subfield><subfield code="b">controlling access to online information</subfield><subfield code="c">Masha Garibyan, Simon McLeish and John Paschoud</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Facet</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 248 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Collection management (Libraries)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Library administration</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources - Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Collection management (Libraries)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Library administration</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Medien</subfield><subfield code="0">(DE-588)4151918-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Benutzung</subfield><subfield code="0">(DE-588)4144483-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bibliothek</subfield><subfield code="0">(DE-588)4006439-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Bibliothek</subfield><subfield code="0">(DE-588)4006439-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Benutzung</subfield><subfield code="0">(DE-588)4144483-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Elektronische Medien</subfield><subfield code="0">(DE-588)4151918-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McLeish, Simon</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1044298871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Paschoud, John</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1044298928</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018618063&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018618063</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">025.1</subfield><subfield code="e">22/bsb</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">025.3</subfield><subfield code="e">22/bsb</subfield></datafield></record></collection> |
id | DE-604.BV035758135 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:03:49Z |
institution | BVB |
isbn | 9781856045889 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018618063 |
oclc_num | 254897758 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-11 DE-12 |
owner_facet | DE-355 DE-BY-UBR DE-11 DE-12 |
physical | XX, 248 S. Ill., graph. Darst. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Facet |
record_format | marc |
spelling | Garibyan, Masha ca. 20./21. Jh. Verfasser (DE-588)1044298782 aut Access and identity management for libraries controlling access to online information Masha Garibyan, Simon McLeish and John Paschoud 1. publ. London Facet 2014 XX, 248 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Collection management (Libraries) Electronic information resources / Access control Library administration Electronic information resources - Access control Elektronische Medien (DE-588)4151918-8 gnd rswk-swf Benutzung (DE-588)4144483-8 gnd rswk-swf Bibliothek (DE-588)4006439-6 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Bibliothek (DE-588)4006439-6 s Benutzung (DE-588)4144483-8 s Elektronische Medien (DE-588)4151918-8 s Zugriffskontrolle (DE-588)4293034-0 s b DE-604 McLeish, Simon ca. 20./21. Jh. Verfasser (DE-588)1044298871 aut Paschoud, John ca. 20./21. Jh. Verfasser (DE-588)1044298928 aut HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018618063&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Garibyan, Masha ca. 20./21. Jh McLeish, Simon ca. 20./21. Jh Paschoud, John ca. 20./21. Jh Access and identity management for libraries controlling access to online information Collection management (Libraries) Electronic information resources / Access control Library administration Electronic information resources - Access control Elektronische Medien (DE-588)4151918-8 gnd Benutzung (DE-588)4144483-8 gnd Bibliothek (DE-588)4006439-6 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4151918-8 (DE-588)4144483-8 (DE-588)4006439-6 (DE-588)4293034-0 |
title | Access and identity management for libraries controlling access to online information |
title_auth | Access and identity management for libraries controlling access to online information |
title_exact_search | Access and identity management for libraries controlling access to online information |
title_full | Access and identity management for libraries controlling access to online information Masha Garibyan, Simon McLeish and John Paschoud |
title_fullStr | Access and identity management for libraries controlling access to online information Masha Garibyan, Simon McLeish and John Paschoud |
title_full_unstemmed | Access and identity management for libraries controlling access to online information Masha Garibyan, Simon McLeish and John Paschoud |
title_short | Access and identity management for libraries |
title_sort | access and identity management for libraries controlling access to online information |
title_sub | controlling access to online information |
topic | Collection management (Libraries) Electronic information resources / Access control Library administration Electronic information resources - Access control Elektronische Medien (DE-588)4151918-8 gnd Benutzung (DE-588)4144483-8 gnd Bibliothek (DE-588)4006439-6 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Collection management (Libraries) Electronic information resources / Access control Library administration Electronic information resources - Access control Elektronische Medien Benutzung Bibliothek Zugriffskontrolle |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018618063&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT garibyanmasha accessandidentitymanagementforlibrariescontrollingaccesstoonlineinformation AT mcleishsimon accessandidentitymanagementforlibrariescontrollingaccesstoonlineinformation AT paschoudjohn accessandidentitymanagementforlibrariescontrollingaccesstoonlineinformation |