Distributed authentication for the Western Australian University Libraries
The need to establish a means of achieving reliable, automated inter-institutional authentication was identified by the Western Australian Group of University Librarians (WAGUL) in 1999 as a strategic priority and a project was subsequently established as a result of a substantial grant from the Com...
| Main Author: | Green, Peter |
|---|---|
| Format: | Conference Paper |
| Published: |
Victorian Association for Library Automation
2004
|
| Subjects: | |
| Online Access: | http://www.vala.org.au/vala2004/2004pdfs/10Green.PDF http://hdl.handle.net/20.500.11937/30633 |
Similar Items
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003)
by: Green, Peter, et al.
Published: (2003)
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)
by: Green, Peter
Published: (2002)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016)
by: Knudsen, Daniel C., et al.
Published: (2016)
Authenticity and Diversity: Enhancing Australian Hepatitis C Prevention Messages
by: Winter, R., et al.
Published: (2013)
by: Winter, R., et al.
Published: (2013)
Commonwealth infrastructure funding for Australian universities: 2004 to 2011
by: Koshy, Paul, et al.
Published: (2013)
by: Koshy, Paul, et al.
Published: (2013)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Measuring Consumer-Based Brand Authenticity
by: Napoli, Julie, et al.
Published: (2014)
by: Napoli, Julie, et al.
Published: (2014)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
The implementation of authentic activities for learning: a case study
by: Baccarini, David
Published: (2004)
by: Baccarini, David
Published: (2004)
Giving virtual world learning a pedagogical boost with a gamified authentic learning design
by: Teräs, H., et al.
Published: (2014)
by: Teräs, H., et al.
Published: (2014)
Testing the Role of Authenticity in Cultural Tourism Consumption: A Case of Mauritius
by: Ramkissoon, Haywantee, et al.
Published: (2010)
by: Ramkissoon, Haywantee, et al.
Published: (2010)
Enhancement of student learning and attitude towards mathematics through authentic learning experiences
by: Blum, Kathleen Mary
Published: (2002)
by: Blum, Kathleen Mary
Published: (2002)
Contesting authentic practice and ethical authority in adventure tourism
by: Rickly, J.M., et al.
Published: (2017)
by: Rickly, J.M., et al.
Published: (2017)
Getting real in the language classroom: developing Japanese students' communicative competence with authentic materials
by: Gilmore, Alexander
Published: (2008)
by: Gilmore, Alexander
Published: (2008)
Musical stage theory: a novel account for the ontology of musical works and the authenticity of music
by: Moruzzi, Caterina
Published: (2018)
by: Moruzzi, Caterina
Published: (2018)
Incongruity between pedagogy of authenticity and contemporary educational apparatus: person-centred phenomenological studies
by: Plust, Urszula
Published: (2023)
by: Plust, Urszula
Published: (2023)
Operationalising gamification in an educational authentic environment
by: Reiners, Torsten, et al.
Published: (2012)
by: Reiners, Torsten, et al.
Published: (2012)
The politics of protest in newspaper campaigns:
dissent, populism and the rhetoric of authenticity
by: Birks, Jen
Published: (2011)
by: Birks, Jen
Published: (2011)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
Influence of positive organisational behaviour and authentic leadership towards organisational performance: a case study
by: Chay, Guo Wei
Published: (2020)
by: Chay, Guo Wei
Published: (2020)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Developing Authentic and Virtual E-Learning Environments
by: Veenendaal, Bert, et al.
Published: (2005)
by: Veenendaal, Bert, et al.
Published: (2005)
Efficient, Authentication and Access control Implementation in Mobile Ad hoc Networks (MANET) as applied to Indoor Navigation Guidance System for Vision Impaired People
by: Rupasinghe, Prabath, et al.
Published: (2012)
by: Rupasinghe, Prabath, et al.
Published: (2012)
Authentic assessment and the Internet: contributions within knowledge networks
by: Allen, Matthew
Published: (2009)
by: Allen, Matthew
Published: (2009)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Leading authentically- a prosocial engagement model for middle level bureaucrats in Malaysia
by: Ahmad, Hal Mahera
Published: (2023)
by: Ahmad, Hal Mahera
Published: (2023)
Into Geothermal Solutions: The Sustainability Case for Challenge Stadium in Perth, Western Australia
by: Oldmeadow, E., et al.
Published: (2010)
by: Oldmeadow, E., et al.
Published: (2010)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Perceived justice and consumer post service failure behaviour: the moderating role of failure severity, attachment styles, and brand authenticity
by: Randhir-Singh, Sarabjit Kaur
Published: (2021)
by: Randhir-Singh, Sarabjit Kaur
Published: (2021)
Designing social media into university learning: technology of collaboration or collaboration for technology?
by: Tay, E., et al.
Published: (2011)
by: Tay, E., et al.
Published: (2011)
‘Well I don’t feel that’: schemas, worlds and authentic reading in the classroom
by: Giovanelli, Marcello, et al.
Published: (2015)
by: Giovanelli, Marcello, et al.
Published: (2015)
Design infrastructure: Australian developments
by: Love, Terence
Published: (2005)
by: Love, Terence
Published: (2005)
Sustainable road infrastructure procurement in Australia
by: Hampson, Keith D., et al.
Published: (2012)
by: Hampson, Keith D., et al.
Published: (2012)
Implementation of spatial data infrastructure for information sharing towards spatially enabled land administration in Malaysia
by: Hamzah, Abd Halim
Published: (2013)
by: Hamzah, Abd Halim
Published: (2013)
Performing the piano works of Maria Szymanowska:
considerations of authenticity, history, and gender
by: Wang, Chenxi
Published: (2025)
by: Wang, Chenxi
Published: (2025)
Selling an Australian Cinderella? YouTube stories
by: Leaver, Tama
Published: (2013)
by: Leaver, Tama
Published: (2013)
ICT in the Research Workflow Survey Report
by: Chan, Janice, et al.
Published: (2019)
by: Chan, Janice, et al.
Published: (2019)
Similar Items
-
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003) -
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002) -
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019) -
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016) -
Authenticity and Diversity: Enhancing Australian Hepatitis C Prevention Messages
by: Winter, R., et al.
Published: (2013)