TY - BOOK AU - Garibyan,Masha AU - McLeish,Simon AU - Paschoud,John TI - Access and identity management for libraries: controlling access to online information SN - 9781783300006 AV - Z695.24 .G37 2014eb U1 - 025.344 22 PY - 2014/// CY - London PB - Facet KW - Electronic information resources KW - Access control KW - Library administration KW - Collection management (Libraries) KW - Sources d'information électroniques KW - Accès KW - Contrôle KW - Bibliothèques KW - Administration KW - Gestion des collections (Bibliothèques) KW - collections management KW - aat KW - LANGUAGE ARTS & DISCIPLINES KW - Library & Information Science KW - General KW - bisacsh KW - eclas KW - Bibliothèque électronique KW - Accès à l'information KW - Fournisseurs d'accès KW - Utilisateurs d'information KW - Données statistiques KW - Etudes de cas KW - fast KW - Royaume-Uni KW - Etats-Unis d'Amérique KW - Electronic books N1 - Includes bibliographical references and index; Title page; Contents; Foreword; Acknowledgements; Note to readers; Glossary; 1 What is access management, and why do libraries do it?; Historical role of libraries in managing access to information; The role of libraries in the 21st century; The history of access management of online information resources; The role of e-commerce in library access management; The 'birth' of access management principles -- Clifford Lynch's white paper; References; 2 Electronic resources: public and not so public; Managing access to electronic collections; How and where users may want to access e-resources; What needs to be protected, and whyCommercially produced resources that need to be protected; Publicly available information that may also require access management; Publishers and licensing issues; Library management of licences; Summary; References; 3 Principles and definitions of identity and access management; Introduction; Managing access? ... or identities? ... or both?; The business relationships; The processes of identity and access management; Identifying the person using a resource -- or not; Obligations to protect personal data about users; Summary; References; 4 Current access management technologiesIP address; Barcode patterns; Proxy servers; Shared passwords; User registration with publishers; Federated access; Summary; 5 Authentication technologies; 'Something you know, something you have, or something you are'; Authentication technologies overview; Authentication by third parties; Choosing an authentication system; Summary; References; 6 Authorization based on physical location: how does the internet know where I am?; Introduction; Domains and domain names; (How) is all this governed?; IP addresses; IP spoofing; Benefits and problems of using IP address-based licensingSummary; References; 7 Authorization based on user identity or affiliation with a library: who you are? Or what you do?; Basing access on identity, or on affiliation with a library; Role-based authorization; Matching roles against licence conditions; Benefits of role-based authorization; Summary; References; 8 Federated access: history, current position and future developments; Single sign-on and the origins of federated access management; The development of standards; Federated access in academia; The future of federated access N2 - This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=766199 ER -