Download PDF by Masha Garibyan, Simon McLeish, John Paschoud: Access and identity management for libraries : controlling

By Masha Garibyan, Simon McLeish, John Paschoud

ISBN-10: 1783300000

ISBN-13: 9781783300006

ISBN-10: 1856045889

ISBN-13: 9781856045889

With the fast bring up within the use of digital assets in libraries, coping with entry to on-line details is a space many librarians fight with. This sensible ebook is the 1st to provide an explanation for the rules in the back of entry administration, the to be had applied sciences and the way they paintings. It offers unique case stories describing how entry administration is being carried out at organizational and nationwide degrees within the united states and Europe, and serves as a realistic consultant to the assets to be had to aid plan, enforce and function entry administration in libraries

Show description

Read or Download Access and identity management for libraries : controlling access to online information PDF

Similar library management books

Download e-book for kindle: Accidental Librarian by Pamela H. Mackellar

Are you doing the activity of a librarian with no the good thing about a library measure or specialist adventure? Do you ask yourself what you have got neglected in formal library schooling, how hugely knowledgeable librarians remain on most sensible in their video game, or what talents and features library administrators search for? Have we bought the e-book for you!

Read e-book online The Strategic Management of Technology. A Guide for Library PDF

Aimed toward pros inside Library and knowledge providers (LIS), this publication is ready the administration of expertise in a strategic context. The publication is written opposed to a backdrop of the full transformation of LIS over the past two decades due to expertise. The e-book goals to supply managers and scholars of LIS in any respect degrees with the mandatory rules, methods and instruments to reply successfully and successfully to the consistent improvement of recent applied sciences, either regularly and in the Library and knowledge prone career particularly.

Operational Risk Management by Ron S. Kenett, Yossi Raanan PDF

Versions and strategies for operational dangers evaluate and mitigation are gaining value in monetary associations, healthcare firms, undefined, companies and businesses typically. This ebook introduces glossy Operational hazard administration and describes how a number of facts resources of alternative forms, either numeric and semantic resources comparable to textual content will be built-in and analyzed.

Download e-book for kindle: Academic Interlibrary Loan Benchmarks by Primary Research Group

The learn offers particular info at the interlibrary personal loan operations of roughly 50 faculties and universities with facts damaged out for various forms of larger schooling associations and through different variables, equivalent to for private and non-private associations, and by way of university enrollment point. The record offers specified info on turnaround occasions for numerous types of interlibrary personal loan borrowing and lending requests, use of expertise and prone, effect of distance studying and MOOCs on interlibrary mortgage, copyright and open entry concerns, the executive jurisdiction of the interlibrary personal loan division, departmental expense constitution, group of workers benchmarks, developments in departmental budgets and different matters in interlibrary personal loan administration.

Additional resources for Access and identity management for libraries : controlling access to online information

Sample text

Managing access? . or identities? . or both? Few libraries and librarians would feel happy with a situation in which they had only a vague idea of what specific printed items were included in their stock. It would be almost inconceivable for a library not to make significant investment in systems and staff time to keep close track of where (inside the library) or in whose safekeeping (outside the library) every one of those items was at any time. This task disappears (in most senses) as physical printed resources are replaced by online resources.

Demonstrates how user registration with publishers might work. Federated access Federated access is a model for access control in which the authentication and authorization are separated and handled by different parties. If a user wishes to access a resource controlled by a service provider (SP), then they log into an identity provider (IdP), which passes information to the SP indicating successful authentication. If the SP trusts the IdP, then it will grant the user access to the resource. More complex forms of federated access involve the use of attributes (information about the user passed from IdP to SP, which can be used to make access decisions) and can include extra services such as trust federations and discovery services (where the user selects which IdP to use to connect to the SP).

4 Accounting The process of collecting statistics and/or billing data. The Garibyan et al. Access & identity TEXT PROOF 04 07/10/2013 14:01 Page 40 40 ACCESS AND IDENTITY MANAGEMENT FOR LIBRARIES same tools can also be used to investigate which user accounts may have been compromised due to unauthorized access. In this chapter we focus on the authentication aspect of access control. Authentication is a process of establishing the user’s right to an identity, in other words, the right to have a name (Lynch, 1998).

Download PDF sample

Access and identity management for libraries : controlling access to online information by Masha Garibyan, Simon McLeish, John Paschoud

by Richard

Rated 4.85 of 5 – based on 38 votes