{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:57:13Z","timestamp":1754157433792,"version":"3.41.2"},"reference-count":11,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,1,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To give an overview of the current state and trends in authentication and authorisation in satisfying academic library users' mobility and instant access to digital information resources, and to propose that libraries strongly support efforts to establish a global authentication and authorisation infrastructure.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>An overview of some national projects towards such an infrastructure for public institutions, including libraries, is provided.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>There are many projects working towards such an infrastructure, but no single widely accepted authentication and authorisation infrastructure exists yet. A global authentication and authorisation infrastructure will enable users to use a single username and a password for all local and remote library services. It will consist of interconnected authentication\/authorisation servers, where each institution will be responsible for a local user database.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The list of projects towards global authentication and authorisation infrastructure is not complete. Projects are not described in detail.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Libraries will have to join efforts towards a global authentication and authorisation infrastructure and to integrate this into their applications. That way, they will improve services for their users who are remote from their home institutions, enable users to access new services faster, lessen user frustration with forgotten passwords, reduce time spent on administrative tasks and also reduce the burden of password management and enable security improvements.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper fulfils an identified need to speed up the development of a global authentication and authorisation infrastructure.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00330330610646816","type":"journal-article","created":{"date-parts":[[2006,7,3]],"date-time":"2006-07-03T16:18:54Z","timestamp":1151943534000},"page":"63-73","source":"Crossref","is-referenced-by-count":2,"title":["Authentication and authorisation infrastructure for the mobility of users of academic libraries"],"prefix":"10.1108","volume":"40","author":[{"given":"Emil","family":"Hudomalj","sequence":"first","affiliation":[]},{"given":"Avgust","family":"Jauk","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022013120361693700_b1","unstructured":"Bertot, J.C. (2003), \u201cWorld libraries on the information superhighway: Internet\u2010based library services\u201d, Library Trends, Vol. 52 No. 2, pp. 209\u201027."},{"key":"key2022013120361693700_b2","unstructured":"British Standards Institution (2000), Information Technology \u2013 Code of Practice for Information Security Management: British Standard, BS ISO\/IEC 17799:2000, BS 7799\u20101:2000, British Standards Institution, London."},{"key":"key2022013120361693700_b3","unstructured":"British Standards Institution (2002), Information Security Management Systems \u2013 Specification with Guidance for Use: British Standard, BS 7799\u20102:2002, British Standards Institution, London."},{"key":"key2022013120361693700_b4","unstructured":"Campbell, J.D. (2003), \u201cAccess in a networked world: scholars portal in context\u201d, Library Trends, Vol. 52 No. 2, pp. 247\u201055."},{"key":"key2022013120361693700_b5","unstructured":"Clark, E. (2003), \u201cMaking peace with passwords\u201d, Network Magazine, (re\u2010titled IT Architect), June, pp. 42\u20106, available at: www.itarchitect.com\/shared\/article\/showArticle.jhtml?articleId=15201403."},{"key":"key2022013120361693700_b6","unstructured":"Logue, S. (2003), \u201cGuest editorial: the changing role of libraries in instructional support\u201d, Information Technology and Libraries, Vol. 22 No. 2, pp. 2\u20103."},{"key":"key2022013120361693700_b7","doi-asserted-by":"crossref","unstructured":"McLean, N. (2000), \u201cMatching people and information resources: authentication, authorisation and access management\u201d, Program, Vol. 34 No. 3, pp. 239\u201055.","DOI":"10.1108\/EUM0000000006932"},{"key":"key2022013120361693700_b8","unstructured":"Paschoud, J. (2004), \u201cEverything I always wanted to know about Shibboleth \u2026 but was afraid to ask Alan Robiette\u201d, available at: http:\/\/hdl.handle.net\/1988\/58."},{"key":"key2022013120361693700_b9","unstructured":"Sankar, J. and Wierenga, K. (2004), \u201cTF\u2010Mobility: inter\u2010NREN roaming\u201d, TERENA Task Mobility (TF\u2010MOBILITY) \u2013 Final Report, available at: www.terena.nl\/tech\/task\u2010forces\/tf\u2010mobility\/Deliverables\/TF\u2010MobilityfinalReport.pdf."},{"key":"key2022013120361693700_b10","unstructured":"TERENA (2004), TERENA Task Force on Authentication and Authorisation Coordination in Europe (TF\u2010AACE) \u2013 Final Report, available at www.terena.nl\/tech\/task\u2010forces\/tf\u2010aace\/Del\/TFAACE\u2010FinalReportv\u20102.pdf."},{"key":"key2022013120361693700_b11","unstructured":"Vaughan, J. and Burnes, B. (2002), \u201cBringing them in and checking them out: laptop use in the modern academic library\u201d, Information Technology and Libraries, Vol. 21 No. 2, pp. 52\u201062."}],"container-title":["Program"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00330330610646816\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00330330610646816\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:55:15Z","timestamp":1753401315000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/dta\/article\/40\/1\/63-73\/323891"}},"subtitle":["An overview of developments"],"short-title":[],"issued":{"date-parts":[[2006,1,1]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,1,1]]}},"alternative-id":["10.1108\/00330330610646816"],"URL":"https:\/\/doi.org\/10.1108\/00330330610646816","relation":{},"ISSN":["0033-0337"],"issn-type":[{"type":"print","value":"0033-0337"}],"subject":[],"published":{"date-parts":[[2006,1,1]]}}}