-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Authorization [x]
- Cybersecurity (116)
- Identity and Access Management (116)
- Authentication (77)
- Networking and Emerging Technologies (43)
- Middleware (39)
- Network Applications (39)
- Network Security and Applications (26)
- Single Sign On (SSO) (24)
- Security Management (23)
- Policy and Law (19)
- Shibboleth (16)
- Directories (15)
- Access Control (13)
- Campus Policies (10)
- Campus Policy and Law (10)
- Federal Policy and Law (10)
- Information Technology Management and Leadership (10)
- Security Policies (10)
- Federated Identity Management (9)
EDUCAUSE Library Items for Authorization
-
Most Improved: How Four Institutions Developed Successful IT Security Programs
-
November 3, 2006
Researchers conducted this in-depth case study to complement the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. The case study examines how four higher education instit…
-
IT Security in Higher Education: A Sea Change
-
October 11, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
ECAR data from 2003 and 2005 make it possible to compare the state of IT security over a critical two-year period. The findings from this analysis are striking, revealing an organizational, technol…
-
Seminar 04A - Care and Feeding of the Institutional Directory Service: Advanced Issues, Problems, and Solutions PLEASE NOTE: Separate registration and fee is required to attend this seminar.
-
October 9, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
Directory architects from the University of Southern California and the University of Maryland, Baltimore County, will share lessons learned while developing and implementing directory services at …
-
Safeguarding the Tower: IT Security in Higher Education 2006
-
October 11, 2006
Presentation at EDUCAUSE 2006, October 9-12, 2006, Dallas, Texas. This presentation summarizes the findings of the EDUCAUSE Center for Analysis and Research 2006 study of information technology s…
-
Safeguarding the Tower: IT Security in Higher Education 2006 – Key Findings
-
October 12, 2006
This document presents the key findings of the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. When ECAR studied IT security in 2003, we discovered that despite efforts …
-
Safeguarding the Tower: IT Security in Higher Education 2006 Roadmap
-
October 12, 2006
This roadmap synthesizes the important issues and recommended actions drawn from the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. When ECAR studied IT security in 200…
-
Safeguarding the Tower: IT Security in Higher Education 2006
-
October 12, 2006
Abstract When ECAR studied IT security in 2003, we discovered that despite efforts to develop a secure IT infrastructure in higher education, uneven management awareness and a culture that e…
-
Campus IT Security: Leveraging Identity Management Technologies
-
October 10, 2006
This bulletin is a companion to Campus IT Security: Governance, Strategy, Policy, and Enforcement, ECAR's 2006 bulletin (No. 17) by the same authors. Security technologies provide various ty…
-
Management Phase 2: Shibboleth as Attribute Delivery for Authorization
-
June 27, 2006
Often, the next step is to enable passing of attribute information about a user to an application for use in making local authorization decisions. While conceptually similar to having the applicati…
-
Technical Phase 2: Shibboleth as Attribute Delivery for Authorization
-
June 27, 2006
Shibboleth retrieves attribute values from the local attribute repository, filters them using a set of attribute release policies, and transports them to a service to make an authorization decision…

















