A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit <a rel="external noopener" href="https://publications.drdo.gov.in/ojs/index.php/djlit/article/download/257/167">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="Defence Scientific Information and Documentation Centre">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b7mnqmqqqfavzfrcykgp33zctm" style="color: black;">DESIDOC Journal of Library & Information Technology</a>
Access management illustrates the process of providing controlled, and secure access to resources. It involves both authentication-the process of determining the validity of a user who claims to be, and autorisation-the process of determining what resources a user is permitted to access. Access management is significant as an important as well as one of the key services for the network infrastructure of digital repository activities for a wide range of audiences. Like the digital collection of<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14429/djlit.29.257">doi:10.14429/djlit.29.257</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vnop4yojerf6lh6qdwrrqf4csu">fatcat:vnop4yojerf6lh6qdwrrqf4csu</a> </span>
more »... igital repository, it also requires that the content be accessed and distributed as widely as possible to valid users around the globe. Access management and control is one of the major concerns for digital content authority over the Internet. Confidentiality and integrity of information cannot be ensured without a proper access management mechanism. Though most of the Institutional Repositories or Open Access Repositories are satisfied with the current mechanisms of the Open Source Software, which they use to build the repositories, restricted repositories or digital libraries demand more security and authenticity. The paper discusses the current practices and issues of access management for digital repositories including user authentications, user authorisation, authentication, and the technology of secured digital communication of digital materials. This paper also gives a basic idea about access management practices in Bangladesh by the digital content providers.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200530194736/https://publications.drdo.gov.in/ojs/index.php/djlit/article/download/257/167" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2d/c8/2dc8711793128186f61b5fc941f3b3cdc1396f02.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14429/djlit.29.257"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>