VINE: Volume 28 Issue 3

Subject:

Table of contents

Security in libraries: authentication & authorisation and Radio Frequency Identification

Andrew Cox

The most inspiring ideal of librarianship, embodied in the public library service is of free access to information for all. On the face of it security is part of the more…

Open authentication systems for the Web

Brian Kelly, Peter Lister

The rapid growth in Internet services has led to a demand for scaleable authentication systems to restrict access to licensed services (such as bibliographical services…

The problems of securing Internet access to electronic documents …and a solution!

John Paschoud

Many full‐text online document resources are currently secured by shared or individual usernames and passwords, or they are completely unprotected from unlicensed access by anyone…

Managing networked information resources more effectively: Candle

Robin Yeates, Andrew Cox

This article describes some of the design ideas being developed in the European Commission co‐funded Candle project. Our aim in the project is to design a tool for libraries to…

The TOLIMAC project: access control, charging and payment of electronic information resources by means of smart cards

Françoise Vandooren

TOLIMAC is a research project funded by the Telematics for Libraries Programme of the EU and is developing a system to provide controlled access to, and management of, networked…

Implementing ATHENS at University College London

Joanne Lomax

The article describes the Athens authentication system, run by NISS for the Joint Information Systems Committee (JISC). She describes the initial implementation of the system at…

Upload not overload! Implementing ATHENS at the University of York with the minimum of fuss

Sue Cumberpatch, Chris Joy

The article describes the approach taken to implementing ATHENS at the University of York, and the close cooperation of library and computing service that made this approach…

RF‐ID: Miracle or mirage?

Steve Smith

The new technology of RF‐ID, intelligent tagging, has become widespread in some industries such as distribution and baggage handling, and is set to dominate retail security in the…

3M's answer to identification technology

John Yorkovich

Every new technology represents both an opportunity and a danger. The opportunity lies in being an early adopter, and embracing a new way of increasing efficiency and decreasing…

ISSN:

0305-5728

Online date, start – end:

1971 – 2015

Copyright Holder:

Emerald Publishing Limited