-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Access Control [x]
- Cybersecurity (103)
- Identity and Access Management (103)
- Security Management (31)
- Information Technology Management and Leadership (25)
- Information Systems and Services (19)
- Authentication (18)
- Network Security and Applications (16)
- Policy and Law (16)
- Authorization (13)
- Campus Policy and Law (12)
- Data Security (12)
- Networking and Emerging Technologies (12)
- Campus Policies (11)
- Privacy (10)
- Security Policies (10)
- Data Administration and Management (9)
- Federal Policy and Law (8)
- Network Applications (8)
- Middleware (6)
EDUCAUSE Library Items for Access Control
-
Delegated Guest Access to Secure Networks
-
October 19, 2005
|
A session at the EDUCAUSE 2005 Annual Conference
Security on advanced wired and wireless networks is a concern for all institutions. Intruders can cause serious operational, legal, and productivity problems. Requiring user authorization can impro…
-
Panel: First Draft of Common Requirements
-
June 30, 2005
Following the diverse use cases presented, the panel will explore the requirements and needs for new tools that leverage local infrastructures to manage and grant access to resources in a virtual o…
-
Managing Privileges
-
June 28, 2005
In the early days of online access control, there was no differentiation made between authentication (proving who you are) and authorization (what you were permitted to do). Once authenticated in a…
-
Portal Services and Multiple Affiliations
-
June 28, 2005
How do you offer services to users with more than one affiliation with an institution? Which affiliation takes precedence? This portal-based case study will present the concepts and how a campus ad…
-
Nexus: Provisioning for the Future at the University of Memphis
-
June 27, 2005
Provisioning is the automated life-cycle management of digital resources provided to members as they join or leave organizations and undergo changes in affiliation or status. Effective provisioning…
-
Identity and Access Management Model: A Functional Approach
-
June 27, 2005
Identity management (IdM) infrastructures consolidate information about individuals and provide a nexus for policy, security, and resource access management. Not only does this framework provide a …
-
Identity Management at Florida State University
-
June 6, 2005
|
A session at the EDUCAUSE Southeast Regional Conference 2005
Like most universities, Florida State was plagued with too many electronic identities. This presentation will discuss the process of merging the identities, along with the technical and nontechnica…
-
Federated Identity Management: Managing Access to Resources in Texas
-
February 17, 2005
|
A session at the EDUCAUSE Southwest Regional Conference 2005
Institutions implementing identity management should consider how their local policies, processes, and technology deployments can be leveraged to participate in broader higher education federations…
-
Identity and Access Management for HIPAA: Technology Model
-
February 10, 2005
This session illustrates how specific HIPAA requirements for security, privacy, and auditability can be addressed by the application of identity and access management middleware as defined by the N…
-
Opening Remarks
-
February 9, 2005
CAMP Med opens with overall program information and a solicitation of topics to be discussed at panel sessions through out the workshop. CAMP Med opens…

















