NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Lavagnino, Merri Beth – Library Hi Tech, 1997
When the Committee on Institutional Cooperation (CIC), an academic consortium of 12 major teaching and research universities began implementing the Virtual Electronic Library, a Continuum of Security Needs list was created which outlines the security and authentication issues that must be addressed. The thirteen security items on the list are…
Descriptors: Academic Libraries, Computer Security, Consortia, Electronic Libraries
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This April 16, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Shimmering with Stories" (Biemiller, Lawrence); (2) "Cultures…
Descriptors: Foreign Countries, Higher Education, College Athletics, College Faculty