Access Management for Networked Information Resources


This article briefly describes the access management problem and the two major architectural approaches (proxies and credentials-based approaches) coming into use to address it. This article does not focus on the technical details involved in authentication and access management; rather, it raises important policy issues in areas such as privacy, accountability, and the collection of management data.

Download Resources