The threat to computing devices by Meltdown and Spectre is widespread.
- 'Meltdown' and 'Spectre': Every Modern Processor Has Unfixable Security Flaws
- Meltdown and Spectre: Bugs in Modern Computers Leak Passwords and Sensitive Data
- Spectre and Meltdown: Details You Need on Those Big Chip Flaws
- Meltdown and Spectre FAQ: Fix for Intel CPU Flaws Could Slow Down PCs and Macs
- Researchers Discover Two Major Flaws in the World's Computers
Roger C. Schonfeld has published "Rethinking Authentication, Revamping the Business" in The Scholarly Kitchen.
Here's an excerpt:
While I have heard these arguments on and off this year, the meeting hosted by CCC [Copyright Clearance Center] made abundantly clear that there is great dissatisfaction with IP-based authentication across the community. Publishers want to move away from it due to their piracy concerns, their desire to improve seamlessness for researchers, and their expectations about the value they can offer through greater personalization. . . . And at least some academic librarians want to move away from it because of the poor user experience, especially with off-site access. Taking aim at IP authentication and proxy servers has become all the rage. But what might supplant them?
EDUCAUSE has released "7 Things You Should Know About Federated Identity Management."
Here's an excerpt :
Identity management refers to the policies, processes, and technologies that establish user identities and enforce rules about access to digital resources. With an enterprise identity management system, rather than having separate credentials for each system, a user can use a single digital identity to access all resources to which the user is entitled. Federated identity management permits extending this approach above the enterprise level, creating a trusted authority for digital identities across multiple organizations. It results in greatly simplified administration and streamlined access to resources; eliminating the need to replicate databases of user credentials for separate applications and systems offers improved security. Federated identity management puts the focus on users of information and services rather than on entities that house those resources.
Although there appears to have been no formal public announcement about its roll out, the DSpace-based Texas Digital Library Repository is available.
The TDL Repository contains some initial materials (mainly ETDs and Seventeenth-Century News) from three of the four founding TDL members (Texas A&M University at College Station, Texas Tech University at Lubbock, and the University of Texas at Austin; there are no materials from the University of Houston) as well as from the University of Texas at Arlington.
Using Open Journal Systems, TDL also provides access to the Journal of Digital Information, which is supported by the Texas A&M University Libraries.
The Texas Digital Library Shibboleth Federation has made progress in providing Shibboleth access to TDL for three of the four founding members (the status as of August 2007 was: Texas A&M University at College Station: fully deployed, Texas Tech University at Lubbock: agreement reached, and the University of Texas at Austin: fully deployed; there was no activity at the University of Houston). Progress was also being made for Shibboleth access for Baylor University, Texas State University, and the University of North Texas.
Here's an excerpt from the Muradora home page that describes Muradora:
Muradora is an easy to use repository application that supports federated identity (via Shibboleth authentication) and flexible authorization (using XACML). Muradora leverages the modularity, flexibility and scalability of the well-known Fedora repository.
Muradora's unique vision is one where Fedora forms the core back-end repository, while different front-end applications (such as portlets or standalone web interfaces) can all talk to the same instance of Fedora, and yet maintain a consistent approach to access control.
Read more about it at "Muradora 1.2.1 Release."
Excerpt from the JISC-SHIBBOLETH announcement:
Many institutions are now at the stage with their implementation of federated access management where issues directly impacting libraries are being considered and managed. This includes discovery processes for end-users, testing and changing access to federated service providers, dealing with different user definitions, managing license and resource information and changing send-user information.
To help support this process we have established a separate mailing list to enable discussion and exchange of views directly relating to library issues.
Excerpt from the Fedora-commons-users announcement:
A new mailing list has been created for discussion, bug reports, implementations questions and development ideas relating to SWORD (Simple Web-service Offering Repository Deposit).
SWORD is a protocol for interoperable deposit between repository platforms. It was developed by a JISC project during 2007, building on earlier work to define a deposit protocol, and is based on the Atom Publishing Protocol.
JISC has issued two reports that examine the increasingly important problem of effectively managing digital identities: E-infrastructure Security: Levels of Assurance: Final Report and The Identity Project: Final Progress Reports.
Here's an excerpt from the press release:
Following two 12-month projects to investigate identity management in higher education and the levels of assurance needed to prove an individual’s identity, JISC has just published two reports which both provide important findings on higher education’s current practice and approaches to identity management.‘Identity is becoming increasingly important in society, meaning that students and staff in further and higher education are starting to ask what their institution is doing to manage their identities.'
The Identity Project report reviews how identity is being addressed across UK higher education and, in more detail, at 10 representative institutions. Identifying the need for greater understanding of some of the key issues involved in identity management, it also calls for improved documentation and standards, greater awareness and training amongst staff and the introduction of regular audits to ensure implementation of appropriate measures across the institution.
Levels of assurance (LoAs) are about how much proof is needed of an individual’s identity to access online resources; whether via a simple user name and password or a more complex system of biometrics and tokens. The JISC report on levels of assurance looks at how LoAs can be defined, agreed and then applied to different resources. . . .