University Information Systems and the need for strong authentication and authorisation
DOI:
https://doi.org/10.7250/eunis.2013.044Keywords:
Authentication, Authorisation, STORK, STORK2.0, ISO 27000Abstract
Corporate academic Information Systems have faced, in the last years, a growing need for meeting high demanding standards for interoperability, transparency, open access, enhancement of learning and research IT infrastructures and applications, cross-border data exchange, etc. All these aspects of IT allow adding an unquestionable value to university information systems. They are not any more internal and isolated systems managed by a few computer experts and used by a limited number of people in the academic community, but open and accessible tools that a wide variety of users may access.References
Andreu, V. Kolbitsch, J. Ribeiro, C. Oreglia, M. Mahlapuu, L. (2009). STORK D6.3.1 Student mobility – Functional Specification. Retrieved May 17, 2013, from: https://www.eid-stork.eu/index.php?option=com_processes&Itemid=&act=streamDocument&did=969
Hulsebosch, B. Lenzini, G. and Eertink, H. (2009). STORK D2.3 - Quality authenticator scheme. Retrieved May 17, 2013, from: https://www.eid-stork.eu/index.php?option=com_processes&Itemid=&act=streamDocument&did=577
RedIRIS (2013). RedIRIS - Spanish Academic and Research Network, Retrieved May 17, 2013, from: http://www.rediris.es/index.php.en
RedIRIS (2012). RedIRIS SIR - The RedIRIS Identity Service. Retrieved May 17, 2013, from: http://www.rediris.es/sir/index.html.en