Access and identity management for libraries: controlling access to online information
This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many libraria...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Facet Publishing
2014
|
Schlagworte: | |
Online-Zugang: | BSB01 UBG01 URL des Erstveröffentlichers |
Zusammenfassung: | This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance. Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include: what is access management and why do libraries do it?; electronic resources: public and not so public; principles and definitions of identity and access management; current access management technologies; authentication technologies; authorization based on physical location; authorization based on user identity or affiliation; federated access: history, current position and future developments; internet access provided by (or in) libraries; library statistics; the business case for libraries. This is essential reading for all who need to understand the principles behind access management or implement a working system in their library |
Beschreibung: | Title from publisher's bibliographic system (viewed on 14 Sep 2022) |
Beschreibung: | 1 Online-Ressource (xx, 248 Seiten) |
ISBN: | 9781783300006 |
DOI: | 10.29085/9781783300006 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048652398 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230116s2022 |||| o||u| ||||||eng d | ||
020 | |a 9781783300006 |c Online |9 978-1-78330-000-6 | ||
024 | 7 | |a 10.29085/9781783300006 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781783300006 | ||
035 | |a (OCoLC)1362876708 | ||
035 | |a (DE-599)BVBBV048652398 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-473 | ||
082 | 0 | |a 025.344 | |
084 | |a AN 77300 |0 (DE-625)6312: |2 rvk | ||
100 | 1 | |a Garibyan, Masha |d ca. 20./21. Jh. |0 (DE-588)1044298782 |4 aut | |
245 | 1 | 0 | |a Access and identity management for libraries |b controlling access to online information |c Masha Garibyan, Simon McLeish and John Paschoud |
264 | 1 | |a London |b Facet Publishing |c 2014 | |
300 | |a 1 Online-Ressource (xx, 248 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 14 Sep 2022) | ||
520 | |a This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance. Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include: what is access management and why do libraries do it?; electronic resources: public and not so public; principles and definitions of identity and access management; current access management technologies; authentication technologies; authorization based on physical location; authorization based on user identity or affiliation; federated access: history, current position and future developments; internet access provided by (or in) libraries; library statistics; the business case for libraries. This is essential reading for all who need to understand the principles behind access management or implement a working system in their library | ||
650 | 4 | |a Electronic information resources / Access control | |
650 | 4 | |a Library administration | |
650 | 4 | |a Collection management (Libraries) | |
650 | 0 | 7 | |a Benutzung |0 (DE-588)4144483-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Medien |0 (DE-588)4151918-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bibliothek |0 (DE-588)4006439-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Bibliothek |0 (DE-588)4006439-6 |D s |
689 | 0 | 1 | |a Benutzung |0 (DE-588)4144483-8 |D s |
689 | 0 | 2 | |a Elektronische Medien |0 (DE-588)4151918-8 |D s |
689 | 0 | 3 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a McLeish, Simon |d ca. 20./21. Jh. |0 (DE-588)1044298871 |4 aut | |
700 | 1 | |a Paschoud, John |d ca. 20./21. Jh. |0 (DE-588)1044298928 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-85604-588-9 |
856 | 4 | 0 | |u https://doi.org/10.29085/9781783300006 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034027157 | ||
966 | e | |u https://doi.org/10.29085/9781783300006 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.29085/9781783300006 |l UBG01 |p ZDB-20-CBO |q UBG_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184800214384640 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Garibyan, Masha ca. 20./21. Jh McLeish, Simon ca. 20./21. Jh Paschoud, John ca. 20./21. Jh |
author_GND | (DE-588)1044298782 (DE-588)1044298871 (DE-588)1044298928 |
author_facet | Garibyan, Masha ca. 20./21. Jh McLeish, Simon ca. 20./21. Jh Paschoud, John ca. 20./21. Jh |
author_role | aut aut aut |
author_sort | Garibyan, Masha ca. 20./21. Jh |
author_variant | m g mg s m sm j p jp |
building | Verbundindex |
bvnumber | BV048652398 |
classification_rvk | AN 77300 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9781783300006 (OCoLC)1362876708 (DE-599)BVBBV048652398 |
dewey-full | 025.344 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 025 - Operations of libraries and archives |
dewey-raw | 025.344 |
dewey-search | 025.344 |
dewey-sort | 225.344 |
dewey-tens | 020 - Library and information sciences |
discipline | Allgemeines |
discipline_str_mv | Allgemeines |
doi_str_mv | 10.29085/9781783300006 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04081nmm a2200553zc 4500</leader><controlfield tag="001">BV048652398</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230116s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783300006</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-78330-000-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.29085/9781783300006</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781783300006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1362876708</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048652398</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">025.344</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AN 77300</subfield><subfield code="0">(DE-625)6312:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Garibyan, Masha</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="0">(DE-588)1044298782</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Access and identity management for libraries</subfield><subfield code="b">controlling access to online information</subfield><subfield code="c">Masha Garibyan, Simon McLeish and John Paschoud</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Facet Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 248 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 14 Sep 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance. Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include: what is access management and why do libraries do it?; electronic resources: public and not so public; principles and definitions of identity and access management; current access management technologies; authentication technologies; authorization based on physical location; authorization based on user identity or affiliation; federated access: history, current position and future developments; internet access provided by (or in) libraries; library statistics; the business case for libraries. This is essential reading for all who need to understand the principles behind access management or implement a working system in their library</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Library administration</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Collection management (Libraries)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Benutzung</subfield><subfield code="0">(DE-588)4144483-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Medien</subfield><subfield code="0">(DE-588)4151918-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bibliothek</subfield><subfield code="0">(DE-588)4006439-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Bibliothek</subfield><subfield code="0">(DE-588)4006439-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Benutzung</subfield><subfield code="0">(DE-588)4144483-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Elektronische Medien</subfield><subfield code="0">(DE-588)4151918-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McLeish, Simon</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="0">(DE-588)1044298871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Paschoud, John</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="0">(DE-588)1044298928</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-85604-588-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.29085/9781783300006</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034027157</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.29085/9781783300006</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.29085/9781783300006</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBG_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048652398 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:20:06Z |
indexdate | 2024-07-10T09:45:05Z |
institution | BVB |
isbn | 9781783300006 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034027157 |
oclc_num | 1362876708 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG |
owner_facet | DE-12 DE-473 DE-BY-UBG |
physical | 1 Online-Ressource (xx, 248 Seiten) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO UBG_PDA_CBO |
publishDate | 2014 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Facet Publishing |
record_format | marc |
spelling | Garibyan, Masha ca. 20./21. Jh. (DE-588)1044298782 aut Access and identity management for libraries controlling access to online information Masha Garibyan, Simon McLeish and John Paschoud London Facet Publishing 2014 1 Online-Ressource (xx, 248 Seiten) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 14 Sep 2022) This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance. Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include: what is access management and why do libraries do it?; electronic resources: public and not so public; principles and definitions of identity and access management; current access management technologies; authentication technologies; authorization based on physical location; authorization based on user identity or affiliation; federated access: history, current position and future developments; internet access provided by (or in) libraries; library statistics; the business case for libraries. This is essential reading for all who need to understand the principles behind access management or implement a working system in their library Electronic information resources / Access control Library administration Collection management (Libraries) Benutzung (DE-588)4144483-8 gnd rswk-swf Elektronische Medien (DE-588)4151918-8 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Bibliothek (DE-588)4006439-6 gnd rswk-swf Bibliothek (DE-588)4006439-6 s Benutzung (DE-588)4144483-8 s Elektronische Medien (DE-588)4151918-8 s Zugriffskontrolle (DE-588)4293034-0 s DE-604 McLeish, Simon ca. 20./21. Jh. (DE-588)1044298871 aut Paschoud, John ca. 20./21. Jh. (DE-588)1044298928 aut Erscheint auch als Druck-Ausgabe 978-1-85604-588-9 https://doi.org/10.29085/9781783300006 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Garibyan, Masha ca. 20./21. Jh McLeish, Simon ca. 20./21. Jh Paschoud, John ca. 20./21. Jh Access and identity management for libraries controlling access to online information Electronic information resources / Access control Library administration Collection management (Libraries) Benutzung (DE-588)4144483-8 gnd Elektronische Medien (DE-588)4151918-8 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Bibliothek (DE-588)4006439-6 gnd |
subject_GND | (DE-588)4144483-8 (DE-588)4151918-8 (DE-588)4293034-0 (DE-588)4006439-6 |
title | Access and identity management for libraries controlling access to online information |
title_auth | Access and identity management for libraries controlling access to online information |
title_exact_search | Access and identity management for libraries controlling access to online information |
title_exact_search_txtP | Access and identity management for libraries controlling access to online information |
title_full | Access and identity management for libraries controlling access to online information Masha Garibyan, Simon McLeish and John Paschoud |
title_fullStr | Access and identity management for libraries controlling access to online information Masha Garibyan, Simon McLeish and John Paschoud |
title_full_unstemmed | Access and identity management for libraries controlling access to online information Masha Garibyan, Simon McLeish and John Paschoud |
title_short | Access and identity management for libraries |
title_sort | access and identity management for libraries controlling access to online information |
title_sub | controlling access to online information |
topic | Electronic information resources / Access control Library administration Collection management (Libraries) Benutzung (DE-588)4144483-8 gnd Elektronische Medien (DE-588)4151918-8 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Bibliothek (DE-588)4006439-6 gnd |
topic_facet | Electronic information resources / Access control Library administration Collection management (Libraries) Benutzung Elektronische Medien Zugriffskontrolle Bibliothek |
url | https://doi.org/10.29085/9781783300006 |
work_keys_str_mv | AT garibyanmasha accessandidentitymanagementforlibrariescontrollingaccesstoonlineinformation AT mcleishsimon accessandidentitymanagementforlibrariescontrollingaccesstoonlineinformation AT paschoudjohn accessandidentitymanagementforlibrariescontrollingaccesstoonlineinformation |