Loading
 

Security and Privacy: Workstation Authentication and Records Retention

Lori Driscoll
Associate University Librarian and Chair of Access Services
University of Florida

Peter Murray
Assistant to the Director for Technology Initiatives
University of Connecticut

Gordon Wishon
CIO, Assoc. Vice President & Assoc. Provost
University of Notre Dame

Efforts to secure computers and networks and the development of corresponding policies and procedures that appropriately protect user privacy present difficult challenges for libraries and institutions of higher education. These policies are of increasing importance due to security concerns, legislation such as the USA PATRIOT Act, and the changing licensing requirements of software and database vendors.

The Association of Research Libraries (ARL) recently published two reports examining patron privacy and authentication of public workstations. The study on patron privacy revealed a wide variety of retention guidelines and few specific privacy policies. Librarians in general were unaware of which records their institution retained and for what length of time and did not fully understand the technological issues related to purging data from computers. The second study showed that there is little consensus on how to handle authentication of public access workstations. Some libraries have policies independent of their institutions’ IT security policies, while others defer to their institutions’ policies. The same issues confound efforts to secure workstations in computer labs, classroom PCs, public kiosks, hardware that is loaned or shared among multiple users, and wireless network access.

This briefing will explore the ARL reports and related campus challenges in light of the “Principles to Guide Efforts to Improve Computer and Network Security for Higher Education” developed by the EDUCAUSE/Internet2 Computer and Network Security Task Force in 2002.

Web Links:
http://www.arl.org/spec/SPEC278WebBook.pdf
http://www.arl.org/spec/SPEC277WebBook.pdf
http://www.educause.edu/security

Handout:
Security and Privacy: Workstation Authentication and Records Retention (DOC)

Presentation:
Security and Privacy: Workstation Authentication and Records Retention (PDF)

Shibboleth and InCommon: An Update and Implications

Ken Klingenstein
Project Manager
Internet2 Middleware Initiative
Chief Technologist
University of Colorado, Boulder

Steve Olshansky
Internet2 Middleware Initiative

Shibboleth, an inter-institutional approach to resource sharing, has made steady progress since its first conceptual presentation at CNI almost four years ago, and is now in rapidly widening deployment. Even as the base product continues to add important functionality, the graphic user interfaces for librarians, system administrators, and end-users are beginning to emerge. Moreover, InCommon, the federated trust mechanism that builds on Shibboleth to enable real production use, is now beginning operations.

The Shibboleth architecture is also being adapted for use in other applications of interest to the CNI community, including P2P file sharing, instant messaging, and Grids. This briefing will provide an update on the status of Shibboleth, other marketplace factors, InCommon, and the advent of new applications.

Web Links:
http://shibboleth.internet2.edu
http://incommon.internet2.edu

Handout:
Shibboleth (PDF)

Presentation:
Shibboleth and InCommon (PPT)

SRW and Metasearch

Ray Denenberg
Senior Networked Engineer
Library of Congress

Jenny Walker
Information Services Division
Ex Libris (USA) Inc.

Robert Sanderson
Special Collections and Archives
University of Liverpool

SRW is an XML-based protocol designed to be a low-barrier-to-entry solution for searching and other information retrieval operations. It uses existing, well tested, and easily available technologies, such as URI, XML, SOAP, HTTP, and XPath. The design reflects the many years of experience gained developing and using Z39.50. SRW is both robust and easy to understand, while retaining many of the important aspects of Z39.50. New web technologies reduce the barriers to new information providers, allowing them to make their resources available via a standard search and retrieve service. Building on Z39.50 semantics enables the creation of gateways to existing Z39.50 systems.

NISO’s Metasearch, one-search access to multiple resources, across platforms, protocols, and vendors, will allow libraries to offer portal environments in which users can enjoy easy searching, as in web-based services like Google, but with added functionality that can normally be achieved only by employing more complicated protocols.

This briefing will provide background on both SRW and the NISO Metasearch initiative, outline Metasearch information retrieval requirements, and address how SRW might support these requirements.

Web Links:
http://www.loc.gov/srw
http://www.niso.org/committees/MetaSearch-info.html

Presentations:
Denenberg (PPT)
Walker (PPT)
Sanderson(PPT)

A “Tip of Our FEDORA: An Under-the-Cap Look at Northwestern University, VTLS and the FEDORA Team

Carl Grant
President and COO
VTLS

Thornton Staples
Director of Research and Development
University of Virginia

Bill Parod
Architect for Scholarly Technologies
Northwestern University

In this briefing, VTLS and Northwestern University will report on their selection of FEDORA as the basis for projects, products, and services, which will also be described. University of Virginia will discuss future directions for FEDORA and ways they are working with their deployment partners to strengthen both FEDORA and associated project and product offerings.

Web Links:
http://www.fedora.info
http://www.vtls.com
http://www.at.northwestern.edu/fedora/

Presentations:
VITAL Part 1 (PPT)
VITAL Part 2 (PPT)
VITAL Part 3 (PPT)
Parod (PPT)

Update from the Joint Committee on P2P File Sharing

Steve Worona
Director of Policy and Networking Programs
EDUCAUSE

Mark Luker
Vice President
EDUCAUSE

The Joint Committee of the Higher Education and Entertainment Communities was formed in December 2002 to address problems arising from the perceived high volume of unauthorized peer-to-peer file sharing taking place on college campuses. The committee is organized into three Task Forces: Technology, Education, and Legislation.

In previous project briefings, we have focused on the activities of the Technology Task Force. In this briefing, we will emphasize the other two. The Education Task Force has recently developed a white paper describing policies and practices that have been adopted at campuses around the country aimed at eliminating, limiting, and/or punishing P2P file sharing. We will review that document as well as other ongoing work of the Joint Committee.


Web Link:
http://www.educause.edu/issues/rfi/

Presentation:
Update from the Joint Committee on P2P File Sharing (PPT)

Virtual Vaudeville: An Interactive 3D Simulation of Historical Performance

David Z. Saltz
Assistant Professor
University of Georgia

Virtual Vaudeville uses 3D gaming technologies to transport scholars and students back to the nineteenth century on their computers. Users can watch a rigorously researched recreation of a vaudeville performance, moving freely through a richly detailed theater to explore the architecture, stage performers, and the reactions of 800 spectators. The project, supported by the National Science Foundation, draws together an interdisciplinary team of historians, digital artists, motion capture specialists, programmers, and theatre practitioners from seven universities. Virtual Vaudeville is a prototype of the “Live Performance Simulation System,” a fully generalizable system for simulating live performance events from any historical period. The project models a powerful new tool for teaching performance and cultural history and for scholarly research and digital publication in the arts and humanities.

Web Link:
http://vvaudeville.drama.uga.edu/

Presentation:
Virtual Vaudeville (PPT)

What Faculty Think of Electronic Resources: 2003

Roger C. Schonfeld
Coordinator of Research
Ithaka

Kevin Guthrie
Chairman
Ithaka

During the fall of 2003, Ithaka commissioned a large survey of faculty at colleges and universities in the United States to learn about their habits and preferences related to electronic research and teaching resources. More than 7,400 faculty from numerous academic disciplines responded.

Some of the topics that will discussed in this project briefing include: faculty’s increasing use of electronic resources; their degree of satisfaction with these resources; their levels of concern with archiving of both print and electronic resources; their views on the library and how its role is changing; and their interest in newer kinds of electronic resources. Breakdowns by various criteria will also be presented, including discipline, size of academic institution, and more. Comparisons will be made with baseline findings from 2000 whenever possible.

Presentation:
What do Faculty Think of Electronic Resources? (PPT)

Who and What Are Shaping the Net? An Update on the Internet Society’s Policy Initiatives

Michael R. Nelson
Director, Internet Technology and Strategy
IBM Vice President, The Internet Society

James X. Dempsey
Executive Director
Center for Democracy and Technology

In many countries, the Internet is becoming a mass media. As a result, it is providing access to information that some governments would rather their citizens not see or hear. Furthermore, new services such as Voice over IP and video streaming are threatening the profits of well-established (and powerful) telephone and broadcasting companies. As a result, more and more governments are feeling compelled to regulate or constrain services provided over the Internet. Last December, the United Nations convened the first World Summit on the Information Society where many speakers called for better “Internet governance” and more government control over the management and evolution of the Internet. The Internet Society is helping policy makers around the world understand how the Internet works and how the genius of the Internet is its decentralized, flexible structure. This session will give an overview of critical Internet policy issues and provide a chance for audience members to discuss how best to address them.

Web Link:
http://www.isoc.org
http://www.inet2004.org

Handout:
The Internet Society’s Public Policy Agenda

Presentation:
Update on Internet Society Public Policy Activities (PPT)