Access and identity management for libraries : controlling by Masha Garibyan, Simon McLeish, John Paschoud

April 3, 2017 | Library Management | By admin | 0 Comments

By Masha Garibyan, Simon McLeish, John Paschoud

With the fast raise within the use of digital assets in libraries, handling entry to on-line details is a space many librarians fight with. This sensible ebook is the 1st to provide an explanation for the foundations at the back of entry administration, the to be had applied sciences and the way they paintings. It offers targeted case experiences describing how entry administration is being applied at organizational and nationwide degrees within the united states and Europe, and serves as a realistic advisor to the assets to be had to aid plan, enforce and function entry administration in libraries

Show description

Read or Download Access and identity management for libraries : controlling access to online information PDF

Best library management books

Family Matters: Adoption and Foster Care in Children's Literature

To aid librarians and academics achieve a deeper realizing of this delicate topic, kin issues: Adoption and Foster Care in kid's Literature takes an in depth examine one hundred fifteen works of kid's literature that experience issues relating to adoption and foster care, together with many who have bought the Newberry Award, Caldecott Award, or different prestigious honors from the yank Library organization.

Parents of Invention: The Development of Library Automation Systems in the Late 20th Century

Mom and dad of Invention: the advance of Library Automation structures within the past due twentieth Century lines the increase and fall of mini-computer-based ILS. In doing so, it deals an insider's view of the method of construction, the technical demanding situations, and the lasting contributions of librarians and programmers at a time whilst librarians and their automation wishes pressured laptop businesses to innovate.

Becoming Confident Teachers. A Guide for Academic Librarians

Changing into convinced lecturers examines the instructing function of knowledge pros at a time of transition and alter in better schooling. whereas guideline is now in general approved as a center library functionality within the twenty first century, librarians frequently lack adequate education in pedagogy and tutorial layout; for this reason discovering their instructing obligations to be tense and hard.

External Quality Audit. Has It Improved Quality Assurance in Universities?

While exterior caliber audits were in position for greater than a decade in a few nations, restricted learn exists at the quantity to which such audits were powerful in bettering structures and tactics for caliber insurance in larger schooling associations, and the level to which such audits have enhanced educational criteria, results and scholar adventure.

Extra resources for Access and identity management for libraries : controlling access to online information

Example text

Without further elaboration, this method of access control is simple to use, and simple for a resource publisher to set up. However, it has problems with security, especially with the need to remove access from users who are no longer privileged to access the resource. Another problem is that users do Garibyan et al. g. by writing down the password). With federated access as an alternative, this access control mechanism has largely faded from the access control map. Elaborations of this method can include passwords which have short expiry periods (such as ones based on the current month).

Access & identity TEXT PROOF 04 07/10/2013 14:01 Page 13 ELECTRONIC RESOURCES: PUBLIC AND NOT SO PUBLIC 13 following a model similar to that for physical books where only a few ‘copies’ can be borrowed at a time. Data, maps and other special resources Another important group of commercially available electronic resources consists of different kinds of data, digital copies of maps and other images, and other special resources, such as statistics. Special resources have benefited greatly from going digital.

By writing down the password). With federated access as an alternative, this access control mechanism has largely faded from the access control map. Elaborations of this method can include passwords which have short expiry periods (such as ones based on the current month). g. to provide access to the internet for conference delegates), when the password expires after the event concludes. 4 demonstrates how shared passwords work. For more details, see Chapters 7 and 8. User registration with publishers Another method which was commonly used in the past was direct user registration with publishers, a process familiar still from many consumeroriented sites.

Download PDF sample

Rated 4.10 of 5 – based on 49 votes