VINE: Volume 28 Issue 3
Table of contents
Security in libraries: authentication & authorisation and Radio Frequency Identification
Andrew CoxThe most inspiring ideal of librarianship, embodied in the public library service is of free access to information for all. On the face of it security is part of the more…
Open authentication systems for the Web
Brian Kelly, Peter ListerThe rapid growth in Internet services has led to a demand for scaleable authentication systems to restrict access to licensed services (such as bibliographical services…
The problems of securing Internet access to electronic documents …and a solution!
John PaschoudMany full‐text online document resources are currently secured by shared or individual usernames and passwords, or they are completely unprotected from unlicensed access by anyone…
Managing networked information resources more effectively: Candle
Robin Yeates, Andrew CoxThis article describes some of the design ideas being developed in the European Commission co‐funded Candle project. Our aim in the project is to design a tool for libraries to…
The TOLIMAC project: access control, charging and payment of electronic information resources by means of smart cards
Françoise VandoorenTOLIMAC is a research project funded by the Telematics for Libraries Programme of the EU and is developing a system to provide controlled access to, and management of, networked…
Implementing ATHENS at University College London
Joanne LomaxThe article describes the Athens authentication system, run by NISS for the Joint Information Systems Committee (JISC). She describes the initial implementation of the system at…
Upload not overload! Implementing ATHENS at the University of York with the minimum of fuss
Sue Cumberpatch, Chris JoyThe article describes the approach taken to implementing ATHENS at the University of York, and the close cooperation of library and computing service that made this approach…
RF‐ID: Miracle or mirage?
Steve SmithThe new technology of RF‐ID, intelligent tagging, has become widespread in some industries such as distribution and baggage handling, and is set to dominate retail security in the…
3M's answer to identification technology
John YorkovichEvery new technology represents both an opportunity and a danger. The opportunity lies in being an early adopter, and embracing a new way of increasing efficiency and decreasing…