Search
Close this search box.
Search
Close this search box.

Appendix B: Suggested Readings

A report from a previous, related workshop

Davis, James R., and Judith L. Klavans. “Workshop Report: The Technology of Terms and Conditions.” D-Lib Magazine, June 1997. Available from http://www.dlib.org/dlib/june97/06davis.html

Core background materials for workshop on April 6

Arms, William Y. “Implementing Policies for Access Management.” D-Lib Magazine, February 1998. Available from http://www.dlib.org/dlib/february98/arms/02arms.html

Gladney, H.M., and J.B. Lotspiech. “Safeguarding Digital Library Contents and Users.” D-Lib Magazine, May 1997. Available from http://www.dlib.org/dlib/may97/ibm/05gladney.html

Stefik, Mark. “Trusted Systems.” Scientific American, March 1997. Available from http://www.sciam.com/0397issue/0397stefik.html.

Wiseman, Norman. “Implementing a National Access Management System for Electronic Services: Technology Alone Is Not Enough.” D-Lib Magazine, March 1998. Available from http://www.dlib.org/dlib/march98/wiseman/03wiseman.html.

Related background readings

Arms, William Y., Christophe Blanchi, and Edward A. Overly. “An Architecture for Information in Digital Libraries.” D-Lib Magazine, February 1997. Available from http://www.dlib.org/dlib/february97/cnri/02arms1.html.

Bide, Mark. “In Search of the Unicorn: The Digital Object Identifier from a User Perspective.” A report for the British National Bibliography Research Fund, November 1997. Available from http://www.britain.eu.net/~bic/bicinfo.html.

Cross-Industry Working Team. “Managing Access to Digital Information: An Approach Based on Digital Objects and Stated Operations.” May 1997. Available from http://www.xiwt.org/documents/ManagAccess/ManagAccessTOC.html.

Garrison, William V., and Gregory A. McClellan. “Authentication and Authorization, Part 2. Tao of Gateway: Providing Internet Access to Licensed Databases.” Library Hi Tech vol. 15, no. 57–58 (1997): 39–54.

Kahn, Robert, and Robert Wilensky. “A Framework for Distributed Digital Object Services.” May 1995. Available from http://www.cnri.reston.va.us/home/cstr/arch/k-w.html.

Lynch, Clifford A. “Authentication and Authorization, Part I. The Changing Role in a Networked Information Environment.” Library Hi Tech, vol. 15, no 57–58, 1997: 30–38.

Machovec, George. “User Authentication and Authorization in a Networked Library Environment: Alliance Issues.” November 1997. Available from http://www.coalliance.org/reports/security.html.

Paskin, Norman. “Information Identifiers.” Learned Publishing, vol. 10, no.2 (April 1997): 135–56. Available from http://www.elsevier.co.jp/inca/homepage/about/infoident/.

Riddle, Bob. “The ICAAP Project, Part Two: The Web Architecture.” Library Hi Tech, vol. 15, no. 57–58 (1997): 71–78.

Roscheisen, Martin, and Terry Winograd. “The Stanford FIRM Framework for Interoperable Rights Management.” Forum on Technology-Based Intellectual Property Management. Interactive Media Association, White House Economic Council and White House Office of Science and Technology. Washington, D.C., 1997. Available from http://mjosa.stanford.edu/~roscheis/IMA/index.html.

Skip to content