background image
communicator, a mobile phone or any other innovative communication device to appear in
the future.
In the moment, such highly sophisticated systems are not yet available, but will become a
reality within the next ten years.
Putting it all together: smart integration
Immersive, interactive environments, personalisation and customisation tools, intelligent
recommender systems, new forms of navigation support and intelligent guides as well as
non-technical authoring tools and distributed hypertext systems for collaborative work are
only a selection of tools that cultural heritage institutions will need at their disposal in the
future. In addition, there will be a range of other systems that are currently used and further
developed in other industry sectors, that will support memory institutions to deliver the
kind of tailor-made and highly interactive services that allow them to fully unlock the value
of their resources. Among the supportive systems are, for example, payment and rights
management systems as well as access management systems.The next section provides a
short overview on these supportive systems, and highlight the issues of relevance to cultural
heritage.
Access management systems
In networked environments where sharing and licensing access to information resources
becomes prevalent, managing authentication and access is a major issue. Access management
systems are needed to manage:
licensing agreements for networked information,
shared limited access resources with other institutions, and finally,
resource sharing collaborations.
Access management systems help to find out if users who seek access to resources are
actually members of the user community that are part of the license agreement.The system
tests and verifies whether individuals are eligible for access to particular resources, according
to a licence agreement.
Access management involves two procedures, which are mostly carried out by the same
system, but that can also be separated.Those procedures are:
Authorisation: The process of determining whether an identified user is permitted
to perform some action, i.e. accessing a resource;
Authentication: Network users establish an identity and receive a "name" which
identifies them uniquely.The most common technologies to give users an
identity is through:
secrets: users receive a PIN or a username and password,
tokens: users are identified uniquely through smart cards or certificates,
biometrics: users are identified on the basis of some natural characteristics, i.e.
fingerprints or voice recognition.
When choosing access management solutions, memory institutions should carefully
investigate the following issues:
Feasibility and deployability: Is the solution practical and does it work on the shop
floor? Is it scalable and can it be adjusted to a large and fluctuating number of users?
How much maintenance does the system need?
244
IX TECHNOLOGY