-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Access Control [x]
- Cybersecurity (103)
- Identity and Access Management (103)
- Security Management (31)
- Information Technology Management and Leadership (25)
- Information Systems and Services (19)
- Authentication (18)
- Network Security and Applications (16)
- Policy and Law (16)
- Authorization (13)
- Campus Policy and Law (12)
- Data Security (12)
- Networking and Emerging Technologies (12)
- Campus Policies (11)
- Privacy (10)
- Security Policies (10)
- Data Administration and Management (9)
- Federal Policy and Law (8)
- Network Applications (8)
- Middleware (6)
EDUCAUSE Library Items for Access Control
-
Student Use of Rich Media
-
May 9, 2007
|
A session at the EDUCAUSE Western Regional Conference 2007
Many institutions provide rich-media environments for their students via podcasting and Webcasting. This presentation will report on two studies of how students use these media. Survey-response dat…
-
Access Control to Workstations in Computer Labs
-
January 1, 2004
California State University, Hayward (CSUH) determined there was a need to prevent unauthorized users from accessing workstations in publicly available computer labs. The system would need to unl…
-
Current Issues Survey Report, 2007
-
January 1, 2007
Current Issues Current Issues Survey Report, 2007 Funding IT reemerges as the top challenge; Security and Identity/Access Management split as separate issues; Course/Learning Management Sys…
-
Seminar 3P - Identity and Access Management: Establishing a Common Vision PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
April 10, 2007
|
A session at the Security 2007
Identity and access management provide the core trusts between and within institutions, applications, and data-access models. In this session, we will discuss identity and access management drivers…
-
AegisUSA and University of Colorado at Boulder - Managing the Life Cycle of Users Through Identity and Access Management
-
April 11, 2007
|
A session at the Security 2007
Institutions of higher education must assess and balance specific security actions against the fundamental commitment to freedom and openness that lies at the heart of academic values. Learn how CU…
-
Border Patrol: Access Denied!
-
March 14, 2007
|
A session at the EDUCAUSE Midwest Regional Conference 2007
The University of Notre Dame has recently changed its network border policy to deny most unsolicited network traffic from the Internet. A small set of services like the Web, secure shell, VPN, and …
-
Sun Microsystems, Inc., An EDUCAUSE Gold Partner and Northeastern Illinois University - Ensuring Provisioning and Secure Access with Identity Management
-
March 13, 2007
|
A session at the EDUCAUSE Midwest Regional Conference 2007
In the online global economy, it's more important than ever to protect sensitive data from internal and external security threats. In this session, Sun (named by Forrester Research as "an…
-
Empowerment vs. Control: What's Your Openness Quotient?
-
January 19, 2007
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2007
Technology attracts students but institutions restrict network activity. Instructors try to incorporate technology in courses, but policies specify what they can install or access. In visiting 15 i…
-
Affiliates/Guests: Who Are These People, and How Do We Give Them Services?
-
January 17, 2007
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2007
The University of Maryland provides limited services to affiliates/guests (not faculty, staff, or students). Previously, there was no coordinated process or system to track this population, facilit…
-
Information Access & Protection Standard
-
January 1, 2006
This standard provides requirements for handling sensitive information that create a balance between accessibility and protection and ensure that information is not improperly changed, inadverten…

















