-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Access Control [x]
- Cybersecurity (103)
- Identity and Access Management (103)
- Security Management (31)
- Information Technology Management and Leadership (25)
- Information Systems and Services (19)
- Authentication (18)
- Network Security and Applications (16)
- Policy and Law (16)
- Authorization (13)
- Campus Policy and Law (12)
- Data Security (12)
- Networking and Emerging Technologies (12)
- Campus Policies (11)
- Privacy (10)
- Security Policies (10)
- Data Administration and Management (9)
- Federal Policy and Law (8)
- Network Applications (8)
- Middleware (6)
EDUCAUSE Library Items for Access Control
-
Better Policy Control Through Privilege Management
-
November 8, 2006
Centrally defined privilege management requires a solid integration strategy to assure that privileges expressed by policies and assigned by users are appropriately applied in a timely manner. Ther…
-
Policy, Process, and Organizational Models
-
November 9, 2006
One element of designing robust groups and privilege policies is the design of the data itself. What is the language of authority, how is it expressed as metadata, and how might it affect the kinds…
-
Moving Forward in Stages
-
November 7, 2006
In this CAMP, we will begin by exploring the limits of a baseline Identity Management environment, then look at opportunities to enhance it in two ways-extending the ability to describe who people …
-
Reports from the Real World
-
November 7, 2006
Some institutions have already taken steps towards enterprise Groups and Privilege Management. We will hear use cases from a few such pioneers-where they started from, what motivated a move and why…
-
Discussion Session: A Look at Ourselves
-
November 7, 2006
In an interactive discussion, attendees reflect on their environment and upcoming service needs and identify any technical and organizational gaps. We'll look at ourselves to see how we are po…
-
Guideline for Requesting Access to Network Data for Research Purposes
-
January 1, 2006
This guideline outlines the approval process required to obtain network data for research purposes and documents the process for review, approval, management and termination of data sharing arrange…
-
Who Owns These Data Anyway? Corralling Data Stewardship
-
October 10, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
How can you build a strong security program if users do not understand their roles and responsibilities in handling the university's data assets? We will talk about the importance of defining …
-
Voyage of the U.K. JISC Federation: Shibbolizing the U.K.'s Research, Higher, and Further Education
-
October 10, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
The U.K. education and research sectors are adopting Shibboleth software for federated access management. This panel will describe the voyage thus far from the perspectives of the strategic funding…
-
Seismic Changes in Secure Access Management
-
October 11, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
Patron attribution is becoming a key issue within institutions for access to electronic resources. Institutions are increasingly required to categorize their members. Newly emerging technologies su…
-
RIT Information Security Policy
-
January 1, 2006
Rochester Institute of Technology's Information Security Policy. Policy includes information on lifecycle protection of RIT information systems, security related to the responsible use of inf…

















