-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Access Control [x]
- Cybersecurity (103)
- Identity and Access Management (103)
- Security Management (31)
- Information Technology Management and Leadership (25)
- Information Systems and Services (19)
- Authentication (18)
- Network Security and Applications (16)
- Policy and Law (16)
- Authorization (13)
- Campus Policy and Law (12)
- Data Security (12)
- Networking and Emerging Technologies (12)
- Campus Policies (11)
- Privacy (10)
- Security Policies (10)
- Data Administration and Management (9)
- Federal Policy and Law (8)
- Network Applications (8)
- Middleware (6)
EDUCAUSE Library Items for Access Control
-
Setting the foundation for identity management
-
January 1, 2006
New Data Center security projects increasingly center on building a strong identity-management base. New Data Center security projects increasingly cen…
-
Network Architecture for Automatic Security and Policy Enforcement
-
April 10, 2006
|
A session at the Security 2006
This session will discuss various approaches for automating technical policy enforcement as a condition for network access in colleges and universities, including approaches that allow for host iso…
-
Wireless Security Strategies and Challenges
-
April 11, 2006
|
A session at the Security 2006
This session will explore issues related to wireless LAN security, from a brief overview of existing techniques (WEP/WPA) to a more in-depth look at the use of 802.1x for access control and encrypt…
-
Identity and Access Management: A Centralized Approach
-
April 12, 2006
|
A session at the Security 2006
Purdue University's IT security and privacy department has developed and implemented a broad computer access provisioning and central authentication and authorization process. This presentatio…
-
Topics in Identity Management: Authorization Strategies
-
March 22, 2006
|
A session at the NERCOMP Annual Conference 2006
As campuses develop more mature identity management infrastructures, authorization services become increasingly critical to access control. Sponsored by NMI-EDIT Consortium of Internet2 and EDUCAUS…
-
Topics in Identity Management: Authorization Strategies
-
March 15, 2006
|
A session at the EDUCAUSE Midwest Regional Conference 2006
As campuses develop more mature identity management infrastructure, implementing authorization services becomes critical to access control. This session, sponsored by the NMI-EDIT Consortium of Int…
-
InCommon: Highlights of Use, Policy, and Operations of the U.S. R&E Federation
-
February 8, 2006
February 8, 2006 CAMP061_154938 …
-
Technical and Policy Requirements for Authentication Arising in Interboundary Work
-
February 8, 2006
Good interrealm architectures rely on good local authentication and related processes. How are identifiers assigned and reassigned? What is trust, how do institutions manage the credential registra…
-
Leveraging Campus Authentication Across Boundaries
-
February 8, 2006
Identity management infrastructures consolidate information about individuals and provide a nexus for policy, security, and resource access management. Not only does this framework provide a way to…
-
Leveraging Guest Accounts for Ubiquitous Web Sign-On System Acceptance
-
October 19, 2005
|
A session at the EDUCAUSE 2005 Annual Conference
We will present Cosign Friend, a scalable, flexible, and lightweight guest account mechanism implemented in conjunction with our Web single sign-on system at the University of Michigan. We address …

















