Descriptor
Access to Information | 2 |
Computer Security | 2 |
Information Networks | 2 |
Information Sources | 2 |
Access to Computers | 1 |
Computer System Design | 1 |
Copyrights | 1 |
Educational Resources | 1 |
Electronic Libraries | 1 |
Higher Education | 1 |
Incentives | 1 |
More ▼ |
Source
Library Hi Tech | 1 |
Author
Cole, Timothy W. | 1 |
Ely, Donald P. | 1 |
Publication Type
Reports - Descriptive | 2 |
Journal Articles | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Ely, Donald P. – 1997
The definition, role, and functions of "library" are changing. The National Library of Education (NLE) is in transition from a traditional library to a virtual library encompassing "one stop [any stop] shopping" through conventional and digital means. To adequately plan for the transition, the customer and potential customers…
Descriptors: Access to Computers, Access to Information, Computer Security, Copyrights