Authentication - an overview of Hybrid Library requirements Jonathan Eaton eLib Concertation Day - Authentication 10th March 1999 Project HeadLine.

Slides:



Advertisements
Similar presentations
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Advertisements

E-learning and Libraries WSIS Forum, Geneva,11 May 2010 Tullio Basaglia, CERN Scientific Information Service, Geneva.
Digital Certificate Operation in a Complex Environment Matthew J. Dovey Oxford University Computing Services.
Modeling Hybrid Information Environments: The Librarian and the Super Model Kerry Blinco Consultant Macquarie University Project Manager LIDDAS Project.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Access Control Methodologies
Supporting Further and Higher Education Building the UK National Information Environment - Lessons from the Past and Pointers To the Future Norman Wiseman.
A community-maintained data store for descriptions of library resources Global Open Knowledgebase (GOKb)
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
A centre of expertise in digital information managementwww.ukoln.ac.uk A Standards Framework For Digital Library Programmes Rosemary Russell UKOLN University.
شهره کاظمی 1 آزمايشکاه سيستم های هوشمند ( A Simple Definition of Portal Shohreh kazemi
Views Chapter 12. What Are Views? A virtual table that comprises the fields of one or more tables in the database It is a virtual table since it does.
Authentication Systems and Single Sign-On (SSO) David Orrell, Eduserv Athens 1st EuroCAMP, 2-4 March 2005, Turin, Italy.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
1 Electric commerce  An introduction to e-Commerce outlining:  The three basic e-Commerce technologies  The trading exchanges to which they apply.
Developments in Access and Identity Management Phil Leahy – Athens Product Manager.
Integrated... Interoperable... Institutional... Implementation... Institutional VLE - Library Integration at University of Ulster.
Rights / Business Models in the NSDL Columbia University David Millman April, 2001.
© Drexel University Software Engineering Research Group (SERG) 1 Based on the paper by Philippe Kruchten from Rational Software.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Ray Collins27th September 2005LGfL Project – workshop report1 LGfL Project Report Proof of Principle of the Shibboleth Authentication & Authorisation Infrastructure.
MEDIN Data Guidelines. Data Guidelines Documents with tables and Excel versions of tables which are organised on a thematic basis which consider the actual.
W w w. i l u m i n a – d l i b. o r g iLumina: A Digital Library of Educational Resources for Science & Mathematics National Science Digital Library All-Projects.
Geoff Payne ARROW Project Manager 1 April Genesis Monash University information management perspective Desire to integrate initiatives such as electronic.
Supporting further and higher education AA(A) – What does it mean to the service provider? Alan Robiette, JISC Development Group.
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.
Promoting the uptake of e-books in UK further and higher education Linda Bennett.
ELib Concertation Day Collection Level Description 7th March 2000 Anne Gambles - London School of Economics Stephen Graham - London Business School.
Integrated... Interoperable... Institutional... Implementation... Facilitating VLE - Library Integration using IMS Enterprise?
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
The New Digital World and the Transformation of Information and Libraries Patricia L. Thibodeau Associate Dean Library Services & Archives Oct. 26, 2011.
4-Plex Model of Networked Learning
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
The Aggravation of Aggregation? Jonathan Eaton London Business School UKSG Conference 2003.
Supporting further and higher education Middleware and AA within the JISC Environment Nicole Harris, JISC Development Group.
EdReNe, 2nd Strategic Seminar (Lisbon, June 2008) (c) 2008, Daniel Weiler, Centre of Technology of Education Luxembourg’s Educational Portal Enabling Connected.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Key themes covered Search engines Locating/ assessing suitable resources Information Skills – knowing where to look Free web-based RDN,NLN, Ferl JISC or.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Supporting Further and Higher Education Collection description as Middleware The Information Environment Service Registry (IESR) Rachel Bruce, Information.
A Security Architecture for Computational Grids Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke Reporter : Po - Jen Lo.
Joint Information Systems Committee Supporting Higher and Further Education Rachel Bruce Programme Manager, JISC Executive Collection.
Database Management Systems (DBMS)
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
Towards a Unified Authentication, Authorisation and Accounting Infrastructure Patrick Kirk Chief Technical Officer (YHGfL) Lifelong Learning Infrastructure.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Security for Distributed Data Management.
ZLOT The Z Texas Implementation Component of the Library of Texas Dr. William E. Moen Principal Investigator.
Globus: A Report. Introduction What is Globus? Need for Globus. Goal of Globus Approach used by Globus: –Develop High level tools and basic technologies.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Supporting education and research The JISC Core Middleware Call Brian Gilmore The University of Edinburgh and JISC Committee for Support of Research.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Event-Based Model for Reconciling Digital Entities Ahmet Fatih Mustacoglu Ahmet E. Topcu Aurel Cami Geoffrey C. Fox Indiana University Computer Science.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Networks ∙ Services ∙ People Licia Florio TNC, Lisbon Consuming identities across e- Infrastructures 16 June 2015 PDO GÈANT.
A Semi-Automated Digital Preservation System based on Semantic Web Services Jane Hunter Sharmin Choudhury DSTC PTY LTD, Brisbane, Australia Slides by Ananta.
Grid Services for Digital Archive Tao-Sheng Chen Academia Sinica Computing Centre
Data and Applications Security Developments and Directions
GSAF Grid Storage Access Framework
OGSA-WG Security Use Cases Jan 29, 2004
JSTOR as a Shibboleth Target
Data and Applications Security Developments and Directions
AAA: A Survey and a Policy- Based Architecture and Framework
Data and Applications Security Developments and Directions
The JISC Core Middleware Call
Views Base Relation View
COMPONENT BASED SYSTEMS: A CLASSIFICATION OF ISSUES
Presentation transcript:

Authentication - an overview of Hybrid Library requirements Jonathan Eaton eLib Concertation Day - Authentication 10th March 1999 Project HeadLine

Presentation Overview u Why access control is problematic for all electronic information ‘stakeholders’ u Understanding different access needs u Criteria for authentication initiatives u Towards an authentication model u Authentication requirements summary

Common Hybrid Library goals u Hybrid Library systems typically comprise – a user centred, Web-based “managed environment” u aim to provide single access point to diverse resources in range of media formats u extend management controls; minimise access discontinuities for users

Electronic Access Issues... u do we have barriers or controls? u Internet promises seamless access u fragmented & weak control mechanisms – “password proliferation” a curse – IP filtering excludes valid (remote) users! – “islands” of user attributes data u a new “inter-organisational” era (Lynch) – supersedes older password model...

A Continuum of Access Needs u Different stakeholder perspectives – user wants unrestricted access – librarian wants managed access – vendor wants validated access u access rights derive from community membership(s) u range of physical and virtual locations u a “single (secure) sign-on” entry point

Authentication & Authorisation u Authentication defines who you are u Authorisation determines what you can do or what you can access, once authenticated u Hybrid Library systems will demand – interoperation AND separation between user attributes and resource metadata databases – finer controls to model increasingly complex relationships

Authentication issues… u Single sign-on goal further complicates authentication issues u User identities and access rights typically fragmented on service-by-service basis u access scenario complexities – personal AND generic identities – personal, customised use of services – multiple “identities” in single session – where is locus of control?

Some evaluation criteria u national authentication infrastructure (e.g. ATHENS) should – integrate academic & commercial sources – supply local & central management controls – offer bridge to future standards/protocols – flexibly incorporate user attributes & resources metadata – use architecture that permits levels of resource access granularity

Towards an authentication model u access control must be flexible; managed u must reflect degrees of indirection in real- world contractual relationships, e.g. – publisher content aggregator – content aggregator library – library user u resource compendium and user attributes database are key components

Authentication needs: conclusion u Future access controls must – be appropriate, robust, flexible, scaleable, simple: “user-proof” – enforce control but maximise access – enact (indirect) contractual relationships – reflect new inter-organisational world – avoid current fragmentation – embody needs of all ‘stakeholders’

Further details are available on the HEADLINE Website at: including outline Project Workplan and project Working Papers as published March 1999 Further Details