Abstract: | Abstract A growing yet unresolved problem in access services today is controlling user access to resources in a networked environment. This paper describes the history of network authentication, explores the issues involved in selecting an authentication method, discusses the benefits and drawbacks of the various methods, identifies efforts by some integrated library services vendors and academic institutions to address this problem, and makes recommendations for selecting an authentication scheme for a college library. The discussions are based in part upon the results of a survey conducted with California community college libraries, various integrated library system vendors, and online resource companies. Technical terms are defined in a glossary. |