-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Access Control [x]
- Cybersecurity (103)
- Identity and Access Management (103)
- Security Management (31)
- Information Technology Management and Leadership (25)
- Information Systems and Services (19)
- Authentication (18)
- Network Security and Applications (16)
- Policy and Law (16)
- Authorization (13)
- Campus Policy and Law (12)
- Data Security (12)
- Networking and Emerging Technologies (12)
- Campus Policies (11)
- Privacy (10)
- Security Policies (10)
- Data Administration and Management (9)
- Federal Policy and Law (8)
- Network Applications (8)
- Middleware (6)
EDUCAUSE Library Items for Access Control
-
Protecting Networked Assets: Logical- and Physical-based Access Control
-
February 14, 2008
How can IAM be helpful in managing network intrusion and access? A researcher wants to show a national grid-enabled resource to her class, but can't access it because she's in a classroom…
-
Appropriate Access: Levels of Assurance
-
February 14, 2008
A level of assurance (LoA) refers to the degree of certainty that (1) a resource owner has that a person's physical self has been adequately verified before credentials are issued by a registr…
-
Appropriate Access: Privacy Requirements, Regulation, and Working with Auditors
-
February 14, 2008
Personal privacy is about protecting individuals and them control over their personal information. Institutional privacy is about protecting proprietary information. In either case, privacy require…
-
Authorization Strategies Panel: Provisioning, Deprovisioning, and Related Methodologies
-
February 14, 2008
Provisioning access is an IAM function, and deprovisioning that access is a security objective. How might these combined objectives be met with common process, and what sorts of access should be ma…
-
Collaborators at the Gates of Troy: Extending E-Services at USC
-
October 25, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
This session will describe and explain the policy, practices, and technologies implemented at the University of Southern California to allow the extension of electronic services for learning, resea…
-
Seminar 01F - Architecting the Institutional Directory Service: Advanced Issues, Problems, and Solutions PLEASE NOTE: Separate registration and fee is required to attend this seminar.
-
October 23, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
Institutional directory service architects and designers face a number of unique technical challenges in higher education. Directory architects from the University of Southern California and the Un…
-
The Access Management Puzzle: Putting the Pieces Together
-
October 26, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
The University of Washington faces a set of identity and access management challenges shared by many universities. The problems are numerous and familiar. To overcome these challenges, UW has imple…
-
Border Patrol: Access Denied!
-
October 25, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
The University of Notre Dame recently changed its network border policy to deny most unsolicited network traffic from the Internet. A small set of services like the Web, secure shell, and VPN are a…
-
Network Security Effective Practices: NAC and VoIP in Higher Ed
-
October 24, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
This session will present a survey and an informal poll of current campus network security practices and products in higher education for NAC (network access control and protection) and VoIP (voice…
-
Federated Access: Identity Management and Access to Protected Resources
-
June 12, 2007
|
A session at the EDUCAUSE Southeast Regional Conference 2007
This session will outline the advantages of organizing working partnerships and business relationships in a federated context. Topics will include InCommon, eAuthentication, and other federations. …

















