University Information Systems and the need for strong authentication and authorisation

Paúl Santapau, Vicente Andreu Navarro, José Gumbau, Andrés Marzal

Abstract


Corporate academic Information Systems have faced, in the last years, a growing need for meeting high demanding standards for interoperability, transparency, open access, enhancement of learning and research IT infrastructures and applications, cross-border data exchange, etc. All these aspects of IT allow adding an unquestionable value to university information systems. They are not any more internal and isolated systems managed by a few computer experts and used by a limited number of people in the academic community, but open and accessible tools that a wide variety of users may access.

Keywords:

Authentication, Authorisation; STORK; STORK2.0; ISO 27000

Full Text:

PDF

References


Andreu, V. Kolbitsch, J. Ribeiro, C. Oreglia, M. Mahlapuu, L. (2009). STORK D6.3.1 Student mobility – Functional Specification. Retrieved May 17, 2013, from: https://www.eid-stork.eu/index.php?option=com_processes&Itemid=&act=streamDocument&did=969

Hulsebosch, B. Lenzini, G. and Eertink, H. (2009). STORK D2.3 - Quality authenticator scheme. Retrieved May 17, 2013, from: https://www.eid-stork.eu/index.php?option=com_processes&Itemid=&act=streamDocument&did=577

RedIRIS (2013). RedIRIS - Spanish Academic and Research Network, Retrieved May 17, 2013, from: http://www.rediris.es/index.php.en

RedIRIS (2012). RedIRIS SIR - The RedIRIS Identity Service. Retrieved May 17, 2013, from: http://www.rediris.es/sir/index.html.en




DOI: 10.7250/eunis.2013.044

Refbacks

  • There are currently no refbacks.




EUNIS 2013

 

ISBN  978-9934-10-433-6 - online