Descriptor
Access to Information | 2 |
Computer Security | 2 |
Computer Software Development | 2 |
Academic Libraries | 1 |
Computer System Design | 1 |
Corporations | 1 |
Electronic Libraries | 1 |
Higher Education | 1 |
Information Services | 1 |
Internet | 1 |
Librarians | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Field, Judy – Computers in Libraries, 1998
Reviews the Internet and intranets, private communications networks within organizations. Examines extranets (organization's intranet offering password-protected external customer and supplier access to selected portions of its intranet) highlighting the viewpoint of librarians. Discusses extranet issues (security, access, user satisfaction),…
Descriptors: Access to Information, Computer Security, Computer Software Development, Corporations
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development