By Masha Garibyan, Simon McLeish, John Paschoud
With the fast bring up within the use of digital assets in libraries, coping with entry to on-line details is a space many librarians fight with. This sensible ebook is the 1st to provide an explanation for the rules in the back of entry administration, the to be had applied sciences and the way they paintings. It offers unique case stories describing how entry administration is being carried out at organizational and nationwide degrees within the united states and Europe, and serves as a realistic consultant to the assets to be had to aid plan, enforce and function entry administration in libraries
Read or Download Access and identity management for libraries : controlling access to online information PDF
Similar library management books
Are you doing the activity of a librarian with no the good thing about a library measure or specialist adventure? Do you ask yourself what you have got neglected in formal library schooling, how hugely knowledgeable librarians remain on most sensible in their video game, or what talents and features library administrators search for? Have we bought the e-book for you!
Aimed toward pros inside Library and knowledge providers (LIS), this publication is ready the administration of expertise in a strategic context. The publication is written opposed to a backdrop of the full transformation of LIS over the past two decades due to expertise. The e-book goals to supply managers and scholars of LIS in any respect degrees with the mandatory rules, methods and instruments to reply successfully and successfully to the consistent improvement of recent applied sciences, either regularly and in the Library and knowledge prone career particularly.
Versions and strategies for operational dangers evaluate and mitigation are gaining value in monetary associations, healthcare firms, undefined, companies and businesses typically. This ebook introduces glossy Operational hazard administration and describes how a number of facts resources of alternative forms, either numeric and semantic resources comparable to textual content will be built-in and analyzed.
The learn offers particular info at the interlibrary personal loan operations of roughly 50 faculties and universities with facts damaged out for various forms of larger schooling associations and through different variables, equivalent to for private and non-private associations, and by way of university enrollment point. The record offers specified info on turnaround occasions for numerous types of interlibrary personal loan borrowing and lending requests, use of expertise and prone, effect of distance studying and MOOCs on interlibrary mortgage, copyright and open entry concerns, the executive jurisdiction of the interlibrary personal loan division, departmental expense constitution, group of workers benchmarks, developments in departmental budgets and different matters in interlibrary personal loan administration.
- Assistive Technologies in the Library
- Scenario planning for libraries
- Digital Information Culture. The Individual and Society in the Digital Age
- Reinvention of the Public Library for the 21st Century
- School Library Management: Just the Basics
Additional resources for Access and identity management for libraries : controlling access to online information
Managing access? . or identities? . or both? Few libraries and librarians would feel happy with a situation in which they had only a vague idea of what specific printed items were included in their stock. It would be almost inconceivable for a library not to make significant investment in systems and staff time to keep close track of where (inside the library) or in whose safekeeping (outside the library) every one of those items was at any time. This task disappears (in most senses) as physical printed resources are replaced by online resources.
Demonstrates how user registration with publishers might work. Federated access Federated access is a model for access control in which the authentication and authorization are separated and handled by different parties. If a user wishes to access a resource controlled by a service provider (SP), then they log into an identity provider (IdP), which passes information to the SP indicating successful authentication. If the SP trusts the IdP, then it will grant the user access to the resource. More complex forms of federated access involve the use of attributes (information about the user passed from IdP to SP, which can be used to make access decisions) and can include extra services such as trust federations and discovery services (where the user selects which IdP to use to connect to the SP).
4 Accounting The process of collecting statistics and/or billing data. The Garibyan et al. Access & identity TEXT PROOF 04 07/10/2013 14:01 Page 40 40 ACCESS AND IDENTITY MANAGEMENT FOR LIBRARIES same tools can also be used to investigate which user accounts may have been compromised due to unauthorized access. In this chapter we focus on the authentication aspect of access control. Authentication is a process of establishing the user’s right to an identity, in other words, the right to have a name (Lynch, 1998).
Access and identity management for libraries : controlling access to online information by Masha Garibyan, Simon McLeish, John Paschoud