The University Library Electronic Identities Authentication System (UL-EIDA): Enhanced by Segmented Virtual Machines and VLANs for Deployment in the Sub-Saharan Region

The University Library Electronic Identities Authentication System (UL-EIDA): Enhanced by Segmented Virtual Machines and VLANs for Deployment in the Sub-Saharan Region

Jameson Mbale
ISBN13: 9781466665392|ISBN10: 1466665394|EISBN13: 9781466665408
DOI: 10.4018/978-1-4666-6539-2.ch040
Cite Chapter Cite Chapter

MLA

Mbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA): Enhanced by Segmented Virtual Machines and VLANs for Deployment in the Sub-Saharan Region." Cloud Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2015, pp. 858-873. https://doi.org/10.4018/978-1-4666-6539-2.ch040

APA

Mbale, J. (2015). The University Library Electronic Identities Authentication System (UL-EIDA): Enhanced by Segmented Virtual Machines and VLANs for Deployment in the Sub-Saharan Region. In I. Management Association (Ed.), Cloud Technology: Concepts, Methodologies, Tools, and Applications (pp. 858-873). IGI Global. https://doi.org/10.4018/978-1-4666-6539-2.ch040

Chicago

Mbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA): Enhanced by Segmented Virtual Machines and VLANs for Deployment in the Sub-Saharan Region." In Cloud Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 858-873. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6539-2.ch040

Export Reference

Mendeley
Favorite

Abstract

World-wide electronic university libraries, with wide accessibility, are considered to be essential units in both academic and nonacademic information utilization. Within this context, the developed world wasted no time improving and expanding their libraries by applying the technology leverage offered by cloud computing. As institutions from developed countries expanded the use of cloud technology for library applications, it became clear that this technology was highly vulnerable to security threats. Nevertheless, this did not retard advanced nations from proceeding. Undaunted, they forged ahead and now are busy building appropriate cloud computing security infrastructures. Despite progress in this area, very little has been done to expand the university libraries in the sub-Saharan region using cloud computing technologies. Even less has been done in these developing countries to plan and develop the building of library computing security infrastructures. It was in view of this deficit that the University of Namibia's (UNAM) University Library electronic Identities Authentication (UL-eIDA) system was conceived to build a cloud computing security framework model suitable for the sub-Saharan region.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.