-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Access Control [x]
- Cybersecurity (103)
- Identity and Access Management (103)
- Security Management (31)
- Information Technology Management and Leadership (25)
- Information Systems and Services (19)
- Authentication (18)
- Network Security and Applications (16)
- Policy and Law (16)
- Authorization (13)
- Campus Policy and Law (12)
- Data Security (12)
- Networking and Emerging Technologies (12)
- Campus Policies (11)
- Privacy (10)
- Security Policies (10)
- Data Administration and Management (9)
- Federal Policy and Law (8)
- Network Applications (8)
- Middleware (6)
EDUCAUSE Library Items for Access Control
-
Organizing a Campus Change: Planning for Identity and Access Management Improvements at UF
-
June 3, 2008
|
A session at the EDUCAUSE Southeast Regional Conference 2008
Leading change across distributed IT service providers requires extensive engagement. Implementing identity and access management (IAM) changes requires involvement of a broad spectrum of constitue…
-
How Identity and Access Management Can Help Your Institution Touch Its Toes
-
May 28, 2008
|
A session at the Enterprise Information & Technology Conference 2008
Successful IT infrastructures and architectures are expected to nimbly provide the context for protecting and sharing information and identities. In today's world, new legislation, expectation…
-
Network Access Control through Quarantine, Remediation, and Verification
-
May 5, 2008
|
A session at the Security 2008
Security engineers from universities across the country discuss their perspectives on network access control. This panel discussion will cover the differing ways these institutions approached the …
-
Spring Roles: Moving Forward on an Access Management Strategy
-
April 1, 2008
|
A session at the EDUCAUSE Western Regional Conference 2008
Enterprise authorization requires the management of group, role, and privilege information to ensure consistent access policy across applications. This session will compare and contrast how multipl…
-
Identity Engines and California College Of The Arts - The Art of Applying Identity to Network Access Control
-
April 1, 2008
|
A session at the EDUCAUSE Western Regional Conference 2008
April 1, 2008 WRC08_162852 …
-
InCommon and the Committee on Institutional Cooperation
-
March 18, 2008
|
A session at the EDUCAUSE Midwest Regional Conference 2008
All dozen institutions comprising the CIC recently decided to join the InCommon Federation. This session will describe the motivation for and experience of joining InCommon. We'll also describ…
-
Implementing MACE Grouper at Brown University
-
March 12, 2008
|
A session at the NERCOMP Annual Conference 2008
Brown University recently implemented MACE Grouper as an integral part of our identity management infrastructure. This presentation will outline the scope of the implementation, discusses lessons l…
-
Flexible Access Control: Shibboleth and the InCommon Federation
-
February 20, 2008
|
A session at the EDUCAUSE Southwest Regional Conference 2008
Texas A&M deployed Shibboleth single sign-on and federating software to control access to on-campus applications as well as licensed third-party course content through the InCommon Federation a…
-
Authorization Strategies Panel: Leading an Effort to Define Roles
-
February 14, 2008
A step up from using groups, role-based access control enables privileges to be assigned to institutional roles assigned to individuals. Even though this is the brass ring of access control, leadin…
-
Web Applications: Development Approaches
-
February 14, 2008
IAM and security must be on the same page regarding web application development to facilitate proper access. What coding practices and assessment practices should web developers use? What tools are…

















