random library quotation Link: Publications Forum Link: About DLF Link: News
photo of books

DLF PARTNERS

""

DLF ALLIES

""

Comments

Please send the DLF Director your comments or suggestions.

Enabling Access in Digital Libraries: A Report on a Workshop on Access Management

by Caroline Arms
February 1999 Copyright 1999 by the Council on Library and Information Resources. No part of this publication may be reproduced or transcribed in any form without permission of the publisher. Requests for reproduction should be submitted to the Director of Communications at the Council on Library and Information Resources.

-ii-


The Digital Library Federation
On May 1, 1995, 16 institutions created the Digital Library Federation (additional partners have since joined the original 16). The DLF partners have committed themselves to "bring together -- from across the nation and beyond -- digitized materials that will be made accessible to students, scholars, and citizens everywhere." If they are to succeed in reaching their goals, all DLF participants realize that they must act quickly to build the infrastructure and the institutional capacity to sustain digital libraries. In support of DLF participants' efforts to these ends, DLF launched this publication series in 1999 to highlight and disseminate critical work.
DONALD J. WATERS
Director
Digital Library Federation

-iii-


Contents

-iv-


Executive Summary
With digital information rapidly increasing in amount and availability, the information management community finds itself facing a wide-reaching and complex set of challenges. One of the primary challenges is how to manage access to information that is sensitive, proprietary, or protected by copyright. Addressing this question requires the attention of
  • policy makers concerned with questions of privacy and protection of data,
  • legal experts who draft contracts and licenses whose terms must be implemented through automated systems for authenticating users and authorizing access,
  • technologists who design software for controlling electronic use and misuse, and
  • publishers and librarians, who, as major providers of information, play a central role in striking a balance between protecting copyright and enabling access to the record of knowledge.
The workshop described in this report focused on the management of access to published information resources through research libraries. Topics discussed include privacy, protection of rights, authorization, and authentication. These are, in fact, important issues of concern to all citizens whenever access to information they seek is controlled automatically.
Among the groups seeking to meet the challenge of access management are the Digital Library Federation (DLF), which consists of major research libraries and archives in the United States, the Center for Research on Information Access (CRIA) at Columbia University, and the Information and Intelligent Systems Division of the Computers, Information Sciences and Engineering Directorate of the National Science Foundation (NSF). On April 6, 1998, they brought together expert practitioners and researchers from several disciplines at a workshop, held at the Brookings Institution in Washington, D.C., to explore some of the more pressing questions for research libraries, including:
How can members of a university that has subscribed to an electronic journal prove that they are authorized to access an article? How is a system to confirm that the staff member, professor, or student is not someone else? Are there ways to screen out impostors?
How finely can information providers discriminate among potential users when making their materials available? What criteria should universities and public libraries, among other organizations, use to determine who should have access to a database of published information, such as the online version of The New York Times? What options do public libraries have to be able to authorize the use of licensed materials to the general citizenry that they serve?

-v-

How can authors and other creators of information resources be protected from digital thievery? Is Garrison Keillor correct in predicting that authors on the information superhighway will become "the deer in the headlights" of a vast traffic they cannot control? [1] What means do custodians have to ensure that the cultural record is accessible but that the proprietary rights of authors and creators are protected against widespread copying and redistribution?
Should digital data be fitted with a digital lock that can be opened only by users with matching keys? How does such a mechanism accord with constitutional and legislative mandates requiring that a balance be struck between the rights of authors and creators and citizens' accessibility to the cultural record?
Such questions and the discussions they stimulated led participants to identify five key properties for the design and adoption of systems that enable access for users while respecting the rights and interests of authors and publishers.
  • Simplicity. The less complex a system of access management, the more readily it can be adopted technologically and organizationally, and the more acceptable it is to all involved in its implementation.
  • Privacy. Systems that manage access to the cultural record must protect the privacy of users from detailed tracking and disclosure of use. User privacy must not be compromised.
  • Good faith. Agreements on access to scholarly information rely on trust among the parties involved. Users and providers would each prefer to depend, in an access management system that implements

    -vi-

    these agreements, on reasonable barriers against abuse rather than complex restrictions that inhibit use.
  • Trusted intermediaries. Intermediaries play an essential role in providing access to the cultural record as parties trusted by both users and providers and as efficient aggregators of distribution and usage. System design must take the role of intermediaries into account.
  • Reasonable terms. Access management systems and license agreements must recognize the distinction between access and use. Overly tight control of access to a resource may impose inappropriate constraints on its use, especially in teaching and research contexts. The most useful system will not limit access to specific user groups known in advance to be interested in a resource, but will be reasonably open to serving unlikely users whose curiosity and research interests may lead them in directions not predicted by those responsible for making the agreements or designing the systems.
Workshop participants also recommended research and project evaluation in two key areas: ,em>system usability and economic models. First, an effort must be made to understand the ways in which users interact with systems, their needs in relation to new information types, and the functionality of these types in the emerging digital environment. Second, new standards of measure must be found to assess the usage of digital resources and thereby to develop alternative pricing schemes and payment mechanisms. Although the conclusions reached at this workshop relate specifically to the problems of managing access to the cultural record in digital form for research and teaching purposes, they apply to other realms as well, including business, medicine, insurance, credit card transactions, and logfiles from Web browsers, all of which involve more sensitive information. Enabling appropriate access to digital information depends on the efforts and talents of many stakeholders: information specialists, librarians, publishers, computer scientists, lawyers, scientists, and policymakers, and the general citizenry.


-1-


Introduction

On April 6, 1998, the Digital Library Federation (DLF) and the National Science Foundation (NSF) sponsored a one-day workshop on ways to improve systems of managing access to digital information. The workshop was an outgrowth of a two-day meeting sponsored by NSF in September 1996 exploring the technology of the terms and conditions for access. [2] The consensus there was that input from a variety of user communities was required to develop formal mechanisms for implementing terms and conditions within digital libraries. This DLF-NSF workshop was convened to provide input from research libraries with a focus on requirements for access management systems that can be designed and deployed in today's technical, legal, and economic environment.

Workshop conveners Judith Klavans, director of Columbia University's Center for Research on Information Access, and Donald Waters, director of the Digital Library Federation, invited experts from the fields of computer science, library technology, publishing, information technology, and to exchange ideas on managing access law (see appendix A for workshop participants). Prior to the workshop, they gave the participants a list of suggested readings and asked them to consider two typical scenarios faced by research libraries (see appendix B for readings and figure 1 for scenarios). In the first scenario, libraries provide digital works to other academic institutions and the public; in the second, they license digital works from publishers or publishers' agents. The conveners asked participants to discuss the scenarios from the perspective of both users and providers of information as a basis for developing requirements for access management systems.

The workshop's objectives were

  • to provide input to the development of the Coalition for Networked Information (CNI) White Paper on interorganizational access management, [3]
  • to identify key research problems for programs such as the NSF's Digital Libraries Initiative and Knowledge and Distributed Intelligence program, and
  • to provide a springboard for implementation projects.


-2-


References

1 GarrisonKeillor, remarks at a panel discussion, Session III, Conference on Intellectual Property Rights and the Arts: The Impact of New Technologies, sponsored by the New York International Festival of the Arts, December 13, 1994 (transcript on file with the Columbia Law Review).



2 James R. Davis and Judith L. Klavans, "Workshop Report: The Technology of Terms and Conditions," D-Lib Magazine, June 1997. Available at http://www.dlib.org/dlib/june97/06davis.html.



3 Clifford Lynch (ed.), A White Paper on Authentication and Access Management Issues in Cross-Organizational Use of Networked Information Resources, Coalition for Networked Information, Spring 1998. Available at http://www.cni.org/projects/authentication/authentication-wp.html.




-3-


Summary of the Day's Activities

In the opening statements, Judith Klavans explained the design and goals of the workshop, noting that its primary concern was access management rather than rights management, as originally announced. Donald Waters explained that systems for access management include two key technical components, authentication and authorization. He noted that the focus of this workshop was on mechanisms for authorization. He outlined issues and options identified through a parallel initiative at CNI, the development of a White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources. Waters reminded participants that the two scenarios presented in the workshop handout should stimulate discussions later in the day.

Two invited presentations set the stage for the discussions. Russell Vaught, director of Academic Computing at Penn State University, described the enterprise-wide authorization database in use at Penn State. John Erickson, Vice President for Systems Development at Yankee Book Peddler, Inc., described the goal of the Rights Metadata Working Group established as part of the joint activities of the National Information Standards Organization (NISO) and the International DOI (Digital Object Identifier) Foundation. In particular, he presented the conceptual model developed by the group to represent rights transactions and a proposed schema for rights operations.

Three groups were formed for two breakout sessions. Each group reflected a balance of expertise and was instructed to use the same approach, outlined in the handout, to examine the two scenarios. In the first breakout session, they were to consider both scenarios from the perspective of users. For the second, their task was to concentrate on the provider's perspective. In the event, it proved hard to draw such lines. Perhaps because the challenge is to find a balance between the perspectives, the natural instinct was to consider both sides of issues such as security and privacy. At the same time, it was immediately apparent that the perspective of the library or institutional user differs markedly from that of the individual end user. In view of this complexity, the report summarizes the discussions from a thematic rather than a chronological standpoint.

Each breakout was followed by a plenary session at which a representative from each group summarized the discussions. Before the final discussion, Peter Jaszi of the Washington College of Law, American University, presented an update on legislative activities concerning copyright and related intellectual property rights (see appendix C).


Opening Statements


Judith Klavans, Director, Center for Research on Information Access, Columbia University

As a backdrop for discussion, Judith Klavans highlighted the findings of two previous workshops on topics related to access management. The first, a two-day workshop on Technology of Terms and


-4-

Conditions, was held in September 1996. This workshop, which Klavans chaired with Jim Davis of Xerox PARC, was also funded by NSF. Roughly 30 participants explored issues from multidisciplinary perspectives. Four breakout groups focused on different aspects of the overall problem, covering the following topics: infrastructure requirements and the factors that encourage or inhibit acceptance of systems for managing terms and conditions; the technical, political, and social uncertainties that prevent the formulation of descriptions of terms and conditions; issues of scale; and ways to express conditions of use.

Of the conclusions reached, three in particular gave stimulus to the present workshop:

  • publishers vary in their approaches to licensing and the degree of control they wish to retain,
  • user communities must be involved in design and testing, and
  • community attitudes and acceptance are of prime importance.
Other important points raised in September 1996 were that technology must accommodate vagueness and ambiguity; ambiguity may be intentional, as a consequence of the legal needs for flexible interpretation; economic pressures push publishers and libraries in opposite directions, and legal and technological developments will affect the economic balance; and international perspectives must be considered.

In December 1996, the Digital Library Federation (then the National Digital Library Federation) and researchers from the six projects funded through the first phase of the Digital Libraries Initiative held a joint meeting at Stanford University. A discussion of terms and conditions focused on points of disagreement and other issues preventing progress in building systems to manage access to information in digital libraries. Participants explored requirements from three perspectives: publishing, libraries, and technology. Publishing needs included a link to systems for digital commerce, a legal infrastructure that offered protection for digital contents, and technical mechanisms for controlling and describing digital content objects. Libraries needed mechanisms for authenticating users and roles, the association of new metadata elements with digital content objects to support self-management, and systems that allow for third-party rights. From a technological perspective, it was argued that progress would be made by ignoring some complexities, partitioning the problem, and discarding (or deferring) intractable parts.

The present DLF-NSF workshop, Klavans continued, would undoubtedly contribute to the development of the CNI White Paper. In the longer term, the findings would influence ongoing collaborative projects in which participants are engaged and would guide the planning and evaluation of access management components of other digital library projects.


-5-


Donald Waters, Director, Digital Library Federation

Donald Waters opened with a brief description of the Digital Library Federation, a consortium composed of the Library of Congress, the National Archives, the New York Public Library, and sixteen of the nation's large research libraries. This organization was formed in 1995 to take the lead in identifying and lowering the barriers to federating digital libraries. One such barrier, said Waters, is the lack of adequate systems for access management, particularly for authorization. He emphasized that access management entails both authentication and authorization and presented a diagram to illustrate the elements of access management (see figure 2). Authentication refers to two distinct processes: verifying the identity of a user and ensuring that content is what it purports to be. Authorization ensures that terms and conditions in an agreement are being met by relating roles associated with a user to properties of an object.

Waters asked participants to focus on authorization within the context of access management. Participants could evaluate specific scenarios, he suggested, by drawing on the draft CNI White Paper edited by Clifford Lynch, which recommends that the following factors be considered in evaluating approaches to access management in universities: granularity or degree of role distinction required, privacy, strength of security, manageability with respect to accountability and ability to collect management data, technical feasibility, and affordability.

The White Paper identifies three approaches used on campuses to support authentication and facilitate authorization by remote information services or resources.


-6-

  • IP source filtering: the institution warrants that traffic from a given set of Internet addresses is legitimate.
  • Proxies: the institution provides a specific machine through which all traffic to and from a service is routed and ensures that only legitimate traffic is permitted.
  • Credentials: each user presents a credential (such as a user ID and password or a digital certificate) to warrant legitimacy.

Waters then introduced the two scenarios and specific questions to be addressed in the breakout sessions (see handout reproduced as figure 1). The terms authentication, authorization, and others associated with access management are defined in appendix D, compiled from definitions used by Waters and the other presenters at this workshop, by the DOI Rights Metadata Working Group, and by Clifford Lynch in the draft CNI White Paper.


Invited Presentations


Creation of an Authorization Database
Russell S. Vaught, Director, Center for Academic Computing, Pennsylvania State University

Russell Vaught described the large multiyear effort at Penn State, a DLF institution, to build central authentication and authorization services for a large university with many campuses. The complexities, he pointed out, reach beyond the technical aspects of the project to issues of university policy and cost-benefit tradeoffs that affect far more than just the computing service organization.

Vaught sought to clarify the meaning of authentication and authorization. He pointed out that they are often confused because they are frequently employed together. Users, he noted, can be authenticated by something they know (such as an identity code or user ID and password), something they have (such as a SecureID card), or something they are (which can be verified, for example, using a retina scan). Authorization grants a user the right to use a system or data and usually presupposes authentication of users.

In 1992 the centralized Computer and Information Systems (CIS) service installed a distributed file system known as AFS, which relied on Kerberos, developed by the Massachusetts Institute of Technology (MIT), for authentication. AFS was developed at Carnegie Mellon University (CMU) and in its early stages was known as the Andrew File System (AFS). AFS and Kerberos both emerged in the 1980s, the byproducts of large projects dedicated to building campus networks and distributed systems. Kerberos provides authentication based on user ID and a password ("something you know"). In the summer of 1993, CIS decided to build a central authentication service based on version 4 of Kerberos to support all core computing systems (such as e-mail, dialup access, and the use of microcomputer labs). Kerberos is used in conjunction with SecureID cards for administrative


-7-

applications in which the high cost of a security breach justifies the cost of the card (which generates passwords for one-time use). The Kerberos database includes 114,500 active principals (user identities); Penn State has 80,000 students and 30,000 faculty and staff at 24 locations.

In mid-1996, CIS decided to provide authorization services that could support more applications. The new system is based on the Distributed Computing Environment (DCE) Security Services, which uses version 5 of Kerberos for authentication. A cross-organizational task group was formed to develop an initial database to control authorization. The new system saw its first application in the summer of 1997. It is now being used to support many applications, including a proxy system for access to the remote JSTOR archive of scholarly journal literature. Vaught hopes that all systems using the old authentication service will be converted by the summer of 1999.

Although the system is complex, Vaught finds other options, such as a Public Key Infrastructure, equally complex and perhaps less cost effective. Performance and scalability, though still a concern, are expected to improve with the planned enhancements to the DCE directory component (and increased network capacity and processing power).


Reflections on the NISO DOI Rights Metadata Working Group
John S. Erickson, Vice President for Rights Technologies, Yankee Rights Management

John Erickson began by pointing out that copyright serves both as enabler and as inhibitor, establishing a balance to facilitate creativity for the overall benefit of society. His presentation described the current state of thinking of the NISO DOI Rights Metadata Working Group, chaired by Sally Morris, of Wiley, U. K., a working group formed to establish a standard rights metadata schema to facilitate electronic commerce for information objects (whether in digital or nondigital form). This working group, which has very active participation from U.K. publishers, is one of several emerging from a series of joint workshops organized by the National Information Standards Organization (NISO) and the International Digital Object Identifier (DOI) Foundation. [4]

The DOI system and related activities have developed within the publishing community and until recently, the focus has been on making


-8-

money through the enforcement of rights. Erickson believes that the group is beginning to tolerate some degree of fair use and the related ambiguity. The joint activities with NISO signal recognition that discussion must be opened up to a broader community.

The group's stated objective is to develop "a consensus rights transaction model through very active, highly visible public discussions and information sharing." The resulting conceptual model is shown in figure 3. [5]

In the group's opinion, certain digital property rights languages, such as that proposed by Mark Stefik of Xerox PARC, have both advantages and disadvantages and hence alternative models are needed for purposes of comparison and practical evaluation. In particular, the group sees a need for a model to express agreements. Their current thinking borrows from approaches used by stock photography agencies and is based on the use of decision trees for evaluating permissions. A basic assumption here is that any use has a price, even if the price is zero. The model can accommodate a default agreement with standard prices for all users for a limited set of operations. Agreements could relate users or classes of users to certain operations on (uses of) classes of objects. Owners and administrators of agreements would have to be able to apply templates of operations and prices to groups of objects and users.

In Erickson's view, it is essential that the gathering of appropriate metadata become part of the publishing workflow. Two other important issues have been raised. Who would be accountable for codifying a license agreement and maintaining the data that supports access management? And would rights metadata for content be made available to third-party services along with descriptive metadata?

After Erickson's presentation, Clifford Lynch (CNI) provided some additional context for the activity of the NISO DOI working


-9-

group. In a new approach to standards setting, NISO has sponsored exploratory workshops encouraging broad participation. In 1997 and early 1998, NISO and the DOI Foundation sponsored a series of joint meetings that addressed the question of whether DOI activities should be brought into the regular process for national and international standards. The meetings, the related electronic forum, and the five or six working groups they spawned have no formal standing within the national or international standards process. They are not intended to be exclusionary and have served a valuable educational role.


References

4 The Digital Object Identifier (DOI) system is a mechanism for marking digital objects in order to facilitate electronic commerce and enable copyright management in a digital environment. The system emerged from activities of the Association of American Publishers, which is a charter member of the International DOI Foundation. As indicted on its Web site (http://www.doi.org/), the foundation is dedicated to supporting the needs of the intellectual property community in the digital environment, by establishing and governing the DOI system, setting policies for the system, choosing service providers for the system, and overseeing its successful operation.



5 Erickson's full set of slides is available on the Yankee Book Peddler, Inc., Web site (http://www.ybp.com/yrm/presentations/DLF_CRIAShow/




Discussion of Scenarios

The scope of workshop discussions was shaped partly by the facts in the scenarios and the questions asked, but perhaps more significantly by the balance of viewpoints inherent in the list of invitees and the experience of the individual participants. Most had considerable insight into the perspectives and legal responsibilities of both the users (or institutions acting as agents for users) and the providers of information resources. Many had also been involved in the parallel development of the CNI white paper and knew that some technical components were being explored in depth through that exercise. At this DLF-NSF workshop, they tended to focus on high-level requirements and policy issues, rather than on the technical details of automating the terms and conditions of use, which had been the major concern of an earlier NSF workshop. Instead, they concentrated on the problems universities and research libraries face today in their capacity as publishers of digital content created at their institution and as intermediaries licensing access from publishers and publishers' agents.

Participants brought substantial real-world experience to the discussion of the scenarios. Many had participated in the negotiation of licenses between libraries and publishers and were familiar with the economic realities that underlie such negotiations and with the practical problems of compliance. Others had struggled to establish what rights might pertain to materials in archival collections being converted to digital form and fully recognize that converting and making such materials accessible entail high costs.

The discussion focused on traditional scholarly resources and relations between academic institutions and publishers of scholarly materials. The market for such content is limited; little new money will be entering the system in the near term. The challenge is to take advantage of the opportunities offered by the electronic environment without "rocking the boat." The market for other classes of material, such as works aimed at the business or consumer market, might present very different issues. As pointed out in the earlier workshop, however, whatever the framework for managing access to digital works and balancing the rights and privileges of user and provider, its success depends on user acceptance. Any system that manages


-10-

access to the growing body of scholarly journal literature that publishers are making available in digital form, for example, must be accepted by the higher education community represented at this workshop or be doomed to failure.

The scenarios prompted discussions on a wide range of topics beyond the specific questions posed in the instructions for the breakout groups. Despite the limitation inherent in a one-day meeting, common themes emerged in the three breakout groups. These themes can guide the design and development of prototype systems.

This report summarizes the workshop discussions under three thematic headings rather than following the day's agenda. Although the discussions did not focus on technical matters, they were certainly built on some assumptions about the technical infrastructure. The first section below describes some of these implicit assumptions; they derive primarily from the CNI White Paper. The factors that affect user acceptance are drawn together in the second section. The third section extracts points that address the specific questions posed for consideration during the breakout sessions. Unanticipated issues that do not fit into these categories are described in a fourth and final section.


Technical Assumptions

A common framework for distributed access management is needed to avoid the proliferation of incompatible mechanisms developed to support specific arrangements. This framework must be general enough to support different mechanisms for authenticating users and must meet global requirements. It must permit access to be controlled at the level of individual objects (such as articles or books), not just at the entrance to a system or service that provides access to a large body of materials.

Today the most common method of controlling access is to filter by source address as defined by the Internet Protocol (IP). This mechanism is not adequate for the longer term. A limitation of particular concern to participants in this workshop is the exclusion of authorized users when they are away from an authorized site. In addition, IP source filtering cannot be applied when providing services to the general public or small organizations, such as schools, which may not have permanent IP addresses.

Universities need to develop campus-based authentication and authorization schemes for purposes other than access to licensed information resources. Authorization systems, such as that described by Russell Vaught in his presentation, are needed to control access to grades and other personal records, to charge for dining services or bookstore purchases, to permit entrance to libraries and sports facilities, and so on. In many cases, university libraries will be able to build on these capabilities to authenticate users and provide credentials acceptable to an access management system. In some cases, a


-11-

library may take a leading role in developing a campus-based authorization scheme.

As Donald Waters pointed out in his introduction, the CNI White Paper has identified three approaches to campus-based authentication and authorization that can interface with remote access management systems. The first approach is IP source filtering. The second is the provision of a gateway or proxy server to which each user must authenticate (typically using an ID and password) and through which all interactions with the remote system are transmitted. In the third approach, a campus-based authentication or authorization system issues credentials acceptable to the remote system. An important example of a credential is a digital certificate, having a data format compatible with Web-based security protocols and used for the distribution of secure information over the Internet according to a standard known as X.509. An acceptable access management framework must interface with all three mechanisms, since no one solution will be able to serve all campuses.


Issues Affecting User Acceptance

Where is the balance between two utopian visions?

Workshop participants observed that two contrasting utopian visions of the future of scholarly communication motivate developments in electronic publishing. For many publishers, the technology provides an opportunity to make more money by charging for every information use. For researchers, the technology holds the promise of free access to information for all. Librarians recognize that the information will not be free, but they seek to provide unfettered access to their users to the extent possible within existing budgets.

Over the last two or three years, interested parties have attempted to establish new rules of business for digital works with voluntary guidelines for fair use. These efforts, such as the Conference on Fair Use, [6] have foundered on the conflicting utopian visions of the parties involved. They have, nevertheless, served to educate all communities about the nature of the differences that divide them. Meanwhile, those engaged in private license negotiations and consortial arrangements have discovered the powers of the marketplace to forge workable solutions. As one participant observed, the longer the library and publishing communities are engaged in these activities, the more rational are the business models they adopt and the licenses they negotiate. The requirement for access management systems to allow for the ambiguity inherent in the related law also becomes clearer, as does the need for access management even when no fees are charged (for instance, to comply with the terms of a gift).


-12-

Libraries are learning that they can respond to terms and conditions they see as unreasonable with the assistance of market forces. As they gain more experience in providing access to electronic resources, they are discovering that most users will accept less than the utopian ideal of free access to everything when they understand the underlying business model and find it reasonable. Publishers, too, are beginning to see that they are unlikely to earn more revenue from their traditional customer base for scholarly journals; furthermore, they recognize that libraries are making an honest attempt to comply with reasonable terms but cannot be expected to control or monitor their users' behavior closely. Nor can the lack of a robust means to enforce copyright still be blamed for holding back electronic publication of scholarly journals. If anything, their volume is increasing so rapidly that academic libraries are having difficulty absorbing them. Although license terms still vary from publisher to publisher, the agreements are growing more similar with experience.

Workshop participants argued that simple, liberal license agreements of the kind used by JSTOR should be the model for the future. [7] Such agreements are clearly less costly to negotiate and implement than others. Licensee institutions should be free to define their user community in the agreement and should take responsibility for authenticating their users (and providing credentials that certify roles, if necessary). Participants also urged publishers of specialized journals not to limit access to specific categories of academic users, as laid out in scenario 2. This practice was seen as a poor business model, since use by community members outside the specific group for whom access was purchased was unlikely to be significant. Prototype access management systems should operationalize simple agreements, to avoid raising expectations that unreasonable conditions could be enforced. Publishers who use simpler business models and offer reasonable license agreements, argued Vicky Reich of HighWire Press and Stanford University, are better able to expand into new markets.

At the same time, some participants strongly recommended that the academic community continue to press for free access for all to the scholarly literature. Such "blue-sky" talk, they said, would offset the commercial pressure for pay-per-view access and dampen the ability of publishers to implement access management systems based on that model. They believed other business models could be constructed to support the costs of managing and providing access to high-quality scholarly information.

What perspectives are needed?

Participants were instructed to consider the two scenarios from two perspectives: user and provider. All three groups, however, soon reached the conclusion that the discussions, particularly of scenario 2, must take into account the perspectives of three entities: publishers,


-13-

libraries as intermediaries or institutional users, and individual end users. To be successful, an access management system must be acceptable to both the end users and the intermediary library. The difficulty is, these parties differ greatly in their goals, economic motivations, legal responsibilities (particularly regarding liability), and in the different values or utilities they attribute to particular publications or works.

Licenses typically represent agreements made between libraries (or parent academic institutions or consortia) and publishers (or publishers' agents). Access management systems that operationalize those agreements, however, will limit what operations an end user can perform on a digital work. Systems must permit an end user to negotiate different terms and conditions for use of a work by establishing a different role through a separate or additional agreement. For example, enhanced terms might be based on an individual society membership or subscription, or on the acceptance of a charge. Some lawyers pointed out that for the end user to be able to exercise some of the privileges afforded by law or take advantage of ambiguities, he or she should be able to make an informed decision to ignore clauses in an agreement made between a library and a publisher. Agreements, suggested one participant, should incorporate formal loopholes permitting a wider range of operations from a special location or through an additional level of authorization.

The fact that all three discussion groups found it necessary to make a distinction between the end user and the institutional user acting as intermediary suggests that access management systems should be designed with such a distinction in mind. One group report included the observation that there will sometimes be a chain of obligation through several intermediaries from users through libraries to publishers (possibly through third-party aggregators) and eventually to authors.

Will there be slow evolution or a revolution?

For libraries, publishers, and the communities they serve, networked access to scholarly information is not a completely new business, but an extension of an existing portfolio of services in an existing economic structure, with staff and customers familiar with old practices. Although there are hopes for long-term efficiencies in replacing paper-based information products with electronic equivalents, and the transformation of the process of scholarly communication has begun, libraries and publishers must deal with both for many years to come. The continuing availability of well-managed, high-quality bodies of scholarly information will depend on professionals who must be rewarded for their efforts. The economic balance among authors, publishers, aggregators and other service providers, libraries, and users may adjust over time, but unless the adjustment is gradual, existing products and services are likely to suffer.

Although participants were not asked to consider the interests of authors, it was clearly assumed that access management systems


-14-

must be acceptable to authors who wish to disseminate their work to the scholarly and scientific communities. Simple business models reflected in effective access management systems would go a long way towards satisfying the needs of authors as well as other interested parties.

Academic users expect predictability and continuity. They expect the electronic environment to offer the functional equivalent of privileges that exist under current copyright law as applied to physical works, including but not limited to fair use. Conditions on the use of electronic versions of articles that create new impediments to research, to teaching practice, or to collaboration across disciplines or between faculty and students are cause for substantial complaint. The academic user expects to have access to information and be able to use it for scholarly purposes at a reasonable price, preferably, but not necessarily, zero. Charges for photocopying and photographic reproductions are common in academic libraries, which may also charge for or limit use of other services. However, users expect free access to the information traditionally found on the library shelves, such as journals to which the library subscribes.

Publishers and learned societies must find ways to reallocate resources and adjust their business model without destroying their short-term financial viability. When negotiating licenses for electronic versions of print publications, they clearly need to maintain revenue (or increase it to cover the new costs associated with the networked dissemination). Learned societies, in particular, are likely to have no cash reserves to invest in the hope of future cost savings; preserving cash flow is a matter of survival.

Libraries, too, are facing serious budget constraints. Many must make do with flat or shrinking budgets not only to maintain existing collections and services while struggling to keep up with prices for serials that are outstripping the rate of inflation, but also to meet the demand for new online services. They hesitate to accept pricing models that do not guarantee control over acquisition budgets.

Will economics govern acceptance?

The acceptance by libraries and end users of electronic publications and associated access management systems will be determined, at least in part, by economic factors. Libraries regularly look for cheaper ways to provide the same services or ways to provide enhanced services at costs they can justify or recover. Users will pay for services and academic administrations will increase budgets only if they expect to receive value for the expenditure.

Transaction costs associated with managing and providing access to scholarly information must be reasonable, whether incurred by users, libraries, or publishers. Arrangements between libraries for free interlibrary loan are common, in part to avoid costly accounting or payment procedures. Recent years have seen a growth in library consortia and third-party services that allow institutions to share the fixed costs associated with negotiating licenses and supporting coherent


-15-

access to a variety of online resources. It is unlikely that information providers, whether publishers (as in scenario 2) or libraries (as in scenario 1) benefit by limiting access to a resource to subsets of users from an academic institution. The transaction costs of ensuring compliance with such limits will almost certainly exceed any loss of revenue sustained in granting more general access.

The pricing of institutional licenses for electronic resources remains a complex issue that requires further research, perhaps along the lines of the University of Michigan's PEAK project. Existing models are not wholly satisfactory. Pay-per-view is not acceptable as the standard pricing scheme for libraries acting as intermediaries. Similarly, it may make sense to base prices on a maximum number of simultaneous users when information is accessed via terminal sessions, but not when it is accessed via stateless Web interactions. For large and heterogeneous user populations (such as the entire population of a state), pricing by size of community makes no sense either. Alternative measures of volume are needed as a basis for subscription prices. But what metrics are appropriate and acceptable? Some participants suggested that fruitful analogies might be drawn from pricing schemes for network connections.

Simplicity pays

Perhaps the strongest message that emerged from this workshop was that whatever the system for managing access, it must be simple. It must be comprehensible and convenient for intermediaries and end users. The emphasis should be on finding ways to reasonably limit abuses and punish abusers rather than complicating life for every user. The system need not be designed to handle every special case but should be able to inform users of nonstandard provisions (such as the complex terms of a gift) without attempting to enforce them. Prototype systems should be developed to handle the majority of routine needs effectively. Publishers appear willing to tolerate a little leakage, if it does not turn into wholesale hemorrhage.

Complexity should be hidden from users, but those who want to know the full details of a complex deed of gift or the reason why access to an item is restricted should be able to find that information. Participants agreed that it is incumbent upon intermediaries (libraries and third-party aggregators) to negotiate simple licenses, with a view to making the management system simple to implement and to explain to users. Several argued that simple licenses benefit providers too, since they are less costly to negotiate and acceptable to a wider range of customers than are more complex licenses.

Systems that are straightforward to implement and easy to use will encourage compliance. Participants argued that is not absolutely necessary for systems designed to manage access to scholarly resources also to handle materials to which access must be limited for reasons of security. In the short term, the aim should be to build a system that operationalizes a few different, simple agreements. The design should be modular, flexible, and have the capacity for


-16-

growth. Extensions can be made later, on the basis of practical experience.


References

6 Report to the Commissioner on the Conclusion of the First Phase of the Conference on Fair Use, U.S. Patents and Trademarks Office, September 1997. Available at http://www1.uspto.gov/web/offices/dcom/olia/confu/conclutoc.html.



7 JSTOR Library License Agreement. Available at http://www.jstor.org/about/license.html.




Convenors' Questions


What kinds of role distinctions are necessary?

Users of the resources in these scenarios may play many different roles, using the term role in a general sense. A faculty member may, for example, act as teacher, author or creator, researcher, consultant, or private individual. It would be impossible, participants argued, for an individual to declare that access to a particular article was being sought in conjunction with only one such role. Some expressed a fear that the mere technical ability to introduce and enforce distinctions among roles would lead to the adoption of practices that would discourage the general pursuit of knowledge and so would not be in the best of academic interests. One librarian recalled a case in which access to a licensed resource was permitted to faculty only during semesters in which they were teaching particular courses, regardless of whether the resource was useful to research or even to the preparation of the courses.

In the context of automated authorization and access management schemes, the term role has a related but more specific sense. It describes recorded characteristics of an individual user, such as membership in a group. Rules within the access management system determine whether a user with a particular role is able to access a resource and what operations he or she can perform on it. A user's role or roles might be established or negotiated in different ways, for example, through a campus-based proxy service or authorization scheme supported by a directory database, by membership in a professional society, or by acceptance of a charge to a credit card. Where institutional licensing of published journals is being considered, roles may be divided into those for which the institution can issue credentials and those that must be negotiated by the individual. Participants agreed that any access management scheme should allow an individual user to negotiate privileges beyond those afforded by institutional credentials or offered to the general public.

Much of the discussion in this area focused on the granularity (degree) of role distinctions required and perhaps transmitted through credentials or gateway services that an institution may provide for members of its community. Privacy, cost of implementation, and institutional requirements (associated with varying missions and policies) were seen as factors here. Some argued strongly that the granularity should be no finer than membership in a community as defined by the licensing institution, in other words, that all those affiliated with a university should have access to the same resources on the same terms. Finer distinctions by school or department within a university (such as those suggested in the second scenario) are likely


-17-

to inhibit cross-disciplinary research. Distinctions between faculty, undergraduates, and graduate students would cause problems for teaching. Others suggested that some distinctions might be necessary because of institutional policies relating to services for alumni, say, or, in the case of state universities, services for the general public. The consensus was that fine role distinctions should be avoided and that certification of any distinctions should be the responsibility of the user institution.

The technology, said participants, should allow libraries and publishers to make the business agreements they want, but both sides are more likely to benefit if the agreements do not rely on complex role distinctions. In the second scenario, licensed journals are only of interest to a subset of the community; in such a case, the licensor and licensee might avoid the transaction costs in enforcing special limitations on access by negotiating the subscription price on a different basis. One suggestion was to base the price on the size of the subset interested in the resource (though not limiting access to this group). Others stressed the value of developing a volume-based approach to pricing other than a pay-per-view model.

The purpose of use, observed two breakout groups, is often more relevant than any characteristic of the user. In the first scenario (public domain materials digitized by libraries), libraries would probably encourage any use for teaching or research but wish to control commercial re-use of digital reproductions made at substantial expense, in order to recover costs or fund future digitization projects. The privileges afforded by the fair use doctrine and exceptions granted in copyright laws are also primarily based on the nature (and effects) of use and not on characteristics of the users. On further reflection, participants concluded that requiring users to declare in advance how they intended to use materials was unrealistic and would be seen as an invasion of privacy.


What rights and duties are expected?

One issue raised by this question related to the use of the term rights. Under U.S. copyright law, observed Mary Levering of the U.S. Copyright Office, publishers and authors have rights in intellectual works but that users exercise privileges and duties. Furthermore, copyright owners and their agents generally manage rights in copyrighted works, whereas libraries generally manage access to those works.

As pointed out earlier (under the heading What perspectives are needed?), users and providers have different expectations. Rights, privileges, duties, and responsibilities are shaped not only by license agreements, but also by the overall legal, economic, and technical environment. They will be subject to change over time.

Legally, privileges and duties may be established through a chain of obligation from author or creator to publisher, to library (possibly via a consortium or third party aggregator) to end user. Not every link in this chain is associated with a formal agreement. In the first scenario, where unpublished materials may be involved,


-18-

there may be no way to follow the chain and establish unambiguously the rights associated with the original materials. Complex terms of gift may impose additional duties on the recipient library. After converting the material to digital form and becoming the provider of online access, the library may wish to assert rights in the digital reproductions in order to safeguard the potential for income or retain control over how the materials are used. Most users of converted archival materials would comply with reasonable terms, if it were easy to determine what the terms were. Automatic enforcement of all such terms is infeasible, since they often apply to subsequent use rather than to access or to specific operations that might be controlled by technical means. Both providers and users would benefit in this case from a mechanism that cautions users about special conditions and allows them to determine whether or how to proceed.

Academic users value their personal space highly. In the words of one librarian, users want the library to "make the connection and get out of the way." They expect to be allowed to exercise personal responsibility or, as one breakout group reported, to have the "right to do reasonable things and the responsibility not to do unreasonable things." They would expect any access management system to allow them access to all the information that they are entitled to have access to, inform them of their privileges and responsibilities, and explain how they can negotiate additional privileges. They expect patterns of use permitted for print publications to carry over into the electronic environment. They also expect that publishers will somehow guarantee that the content they are accessing has not been corrupted inadvertently or maliciously.

For their part, publishers hope to maintain revenue, whether to satisfy shareholders, subsidize other activities, or simply cover costs. To achieve this end, they expect to control distribution of works for which they hold rights. They expect that privileges given to users based on a reasonable business model can be implemented by technical means. To be acceptable to publishers, an access management scheme must be customizable to individual license agreements and flexible enough to incorporate new types of agreement and new technology for authentication and for delivery of content. Market forces will determine which technical barriers to access and usage protect revenue and which inhibit market expansion.

As intermediaries, libraries have the responsibility to negotiate reasonable agreements on behalf of their user communities and parent institutions. They cannot be responsible for the actions of end users, but they do have a duty to take reasonable efforts to inform users of terms and conditions for access and use and to ensure that institutional policies, as well as systems or data that support access controls are effective and valid. They will expect to understand how license agreements are encoded and enforced within an access management scheme, in order to fulfil these responsibilities. Libraries (or their parent institution or agent) must make reasonable assurances that proxy or gateway services exclude unauthorized users and that credentials offered for users are valid. In return, they will expect


-19-

publishers' access management schemes to honor the credentials provided and facilitate access through such proxies.

In the print environment, libraries have assumed the responsibility for archiving materials for posterity. Under section 108 of the U.S. Copyright Law, libraries and archives may reproduce materials in certain circumstances, for example, to replace "a copy or phonorecord that is damaged, deteriorating, lost, or stolen, if the library or archives has, after a reasonable effort, determined that an unused replacement cannot be obtained at a fair price." [8] In an electronic environment in which the publisher controls the master copy, after-the-fact preservation will be impossible. Archiving for preservation must be planned for in advance. Libraries, as custodial institutions, will expect license agreements, and access management schemes that implement them, to provide contingency provisions and fail-safe mechanisms that ensure the long-term accessibility of the information resource. The long-term archiving of information in digital form presents a formidable challenge. Information, concluded one breakout group, "will only be preserved if someone's job depends on preserving it." Although the archiving challenge was beyond the scope of the workshop, participants noted that a possible contribution to an eventual solution would be special access management provisions that allowed libraries or trusted agents to make archival copies.


What are the privacy issues?

Participants were unanimous in their view toward the privacy of individual users, an important issue in the discussions surrounding the development of the CNI White Paper: the metadata that establishes privileges, they argued, should be under the control of the licensing organization and closely guarded. Using the CNI's categories of identification (anonymous, pseudonymous, pseudonymous with demographics, and actual identities), they recommended that campus-based authentication services, gateways, or proxies should not relay actual identities to access management schemes run by publishers or aggregators. Anonymous access, they concluded, poses the least threat to privacy. Pseudonymous identifiers ensure accountability by allowing a publisher to identify abnormal volumes of use by one (unidentified) user and notify the licensing organization. The association of demographic information with pseudonymous identifiers should be limited; under no circumstances should it be detailed enough to identify an individual user. As librarians have found, some publishers request more details than they can usefully analyze. However, libraries require some tracking of demographics for acquisition decisions and resource allocation, while providers may need such information to adjust business models.

Participants stressed that no unnecessary information should be tracked by provider or licensing institution. Users should not be required


-20-

to indicate the purpose of use. In many states, library reader records are confidential, and the law prohibits libraries from tracking readers' behavior. The academic community, some participants argued, should lobby for more extensive legal protection for privacy, extending to transactions with publishers and bookstores. However, it is reasonable to allow users to reveal personal information voluntarily in order to secure additional privileges, if they are told how that information will be protected.


How strong must the security controls be?

The design of any access management scheme will balance the tightness of security against user inconvenience and even denial of access to valid users in some cases. The degree of security enforced should be commensurate with the provider's trust in the user community. Publishers, it was also pointed out, do recognize that libraries are basically honest and will try to comply with reasonable license agreements to the best of their ability. Existing arrangements suggest that they would honor credentials generated through campus-based authentication schemes. Where trust between libraries is concerned, as in the first scenario, libraries have already proved the benefits of mutual trust in many resource-sharing activities, such as interlibrary loan. Libraries will certainly trust each other's authorization procedures if technically compatible.

In neither of the scenarios examined by the workshop does the content call for very tight security. The limited market value of scholarly and archival information is unlikely to invite widespread abuse. Thus, in the case of a student dropout, say, it would not be essential for the system to be able to revoke privileges immediately. Other classes of information, however, such as current recreational literature or some reference materials, might require more robust controls because of the potential for publishers to lose revenue.

Legal experts reminded participants that no access management scheme exists in a vacuum and that the external environment must be taken into account. They recommended that access management systems emphasize the detection of inappropriate behavior rather than enforcement ahead of time, which is likely to prevent some valid use. Users, they added, need to know what their responsibilities are, and institutional policies need to include adequate sanctions for abusers and procedures for dealing with them. Abuse could be punished by revoking privileges within the system or within the external environment.

In considering how to balance accountability and privacy in the campus environment, participants found one technical approach that had emerged in the discussions relating to the CNI White Paper as promising. Campuses could issue short-term pseudonymous certificates to authenticated users. Certificates valid for a semester or a year could act as credentials for access to most information resources. For selected resources, certificates valid for a few hours might be more appropriate.


-21-


What kinds of accountability are necessary and what kinds of management data are needed?

Participants reiterated that libraries cannot, in practice, be accountable for the actions of users. Realistically, they can only make reasonable efforts to ensure compliance with license terms and the law. Any license agreement between a publisher or publisher's agent and a library will include some clauses relating to accountability of either party for complying with terms of the agreement. The JSTOR Library License Agreement, repeatedly cited as a model, stipulates that libraries must inform JSTOR if they are using a proxy server to control access, must exert reasonable efforts and cooperate with JSTOR in the implementation of security procedures, must work with JSTOR to inform users of the User Rules, and must notify JSTOR if the library becomes aware of violations. The license allows either JSTOR or the licensee organization to terminate access in the case of unauthorized use. To the extent that access to licensed resources is supported by technical means, some degree of accountability for the effectiveness of those technical controls is to be expected. As mentioned in the discussion on security controls, the group favored after-the-fact accountability rather than automated enforcement that might prevent valid access.

In conjunction with the discussion on privacy, participants observed that libraries, even when objecting to licenses that limit access to subsets of users, may still wish to collect usage statistics aggregated by demographic categories in order to make acquisition decisions and allocate resources. As noted earlier, some publishers ask for access to more demographic details than they fully use. No specific suggestions emerged as to an appropriate level of detail. In this instance, it is possible that both publishers and libraries would like to gather more detail for management purposes than is consistent with protection of the user's privacy.


How do we evaluate effectiveness of the system from user and provider perspectives?

According to participants, the basic test for a general access management scheme will be whether it is adopted in the marketplace. Its success will depend at least in part on quantity and breadth of use and its viability on whether the various parties receive appropriate value in the bargains they strike. Not surprisingly, no short-term or formal measures of effectiveness were discussed, since there is still much uncertainty about how best to evaluate digital libraries. No better criteria have emerged than precision and recall, which have served heretofore to evaluate information retrieval systems of much more limited scope.


-22-


References

8 Copyright Law of the United States, contained in Title 17 of the U.S. Code, Section 108: "Limitations on Exclusive Rights: Reproduction by Libraries and Archives." Available at http://lcweb.loc.gov/copyright/title17/1-108.html.




Unanticipated Issues


Where do authors fit in?

As pointed out in the final plenary discussion session, the instructions for the breakout discussions omitted an important topic: the rights and perspectives of authors. In the end, it was decided that the relationship between authors, publishers, and users was too complex to bring into the discussion, and that a separate session would be needed to represent the perspective of authors. During the discussion, several points were made. Some participants argued that authors are both the ultimate information providers and, at least for scholarly journals, also the ultimate users. Faculty researchers must be educated to think twice about assigning all rights for articles to publishers, given the costs university libraries must bear in buying back the right to access the content and other barriers to broad access that publishers might wish to impose.

Other participants pointed out that the apparent equivalence between users and authors mentioned above is simplistic and demonstrates an American viewpoint rather than a global perspective. Legally, the rights of authors are very different from the privileges of users. In many other countries, authors retain moral rights even when they assign copyright to publishers; in some countries, they may not waive those rights. In Europe, authors have made their voices heard in objections to attempted agreements between libraries and publishers. Groups representing authors are working to use the technology to enforce their own rights, for instance by supporting the development of digital watermarking technology. In the United Kingdom, the Authors' Licensing and Collecting Society (ALCS) is adamantly opposed to the U.S. concept of fair use.


What about unaffiliated individuals and small institutions?

Scenario 1 highlights the fact that most academic libraries consider their services to unaffiliated individuals -- the general public -- an important component of their mission. For the Library of Congress and the New York Public Library, the provision of unfettered access to digitized collections is essential. Likewise, many state university libraries are required by law to provide service to unaffiliated users.

Increasingly, consortial and outreach activities undertaken by universities require academic libraries to provide services to smaller, less well-endowed institutions, such as K-12 schools, that do not have the technical infrastructure to provide authentication services. Institutions may wish to provide access to resources for which the library may not legally provide general access, but for which rights holders have granted permission for educational use. To facilitate access to such materials from schools and public libraries, the Library of Congress has considered establishing a site-license arrangement (at little or no charge). It lacks the technology and resources,


-23-

however, to implement such a scheme nationwide, because these institutions lack the necessary technical infrastructure. Even the simple application of IP source filtering is not feasible, since many small organizations do not have permanent IP addresses, but obtain them dynamically from Internet Service Providers each time they establish a connection. Clearly, state or local government agencies, consortia, or other third-party organizations must ensure that basic, uniform authentication and authorization services are available for small institutions and unaffiliated users.


Accommodating change

As pointed out earlier, the external legal, economic, and social framework in which access management schemes operate will change over time. Systems must be able to adapt to such changes if they are to succeed. The need for such flexibility may determine how best to represent rights or responsibilities within metadata associated with digital material and as rules implemented within access management systems. System designers should take nothing for granted: even status transitions that appear to be predictable -- as in the case of expiration dates for copyrights held by corporate bodies or by creators who have died -- are not certain, as current legislative recommendations to extend the period of copyright demonstrate (see appendix C). Furthermore, they must be prepared for changes of global dimensions: when photocopiers were introduced, copyright laws around the world were modified. Similarly, electronic publishing and network technology will disrupt the delicate balance between enabling creativity and inhibiting theft of intellectual property. As this effect is better understood, more changes to copyright laws are inevitable.

Two other notable trends in the external environment in recent years are creating further challenges for the design and deployment of access management systems. The growing phenomenon of distance learning in many universities leads to pressure for remote access to more library services in order to serve the expanded student body. Libraries are also establishing consortia to share the costs of licensing or of mounting electronic resources. For multicampus institutions, new centralized organizations may be formed to serve this role. For libraries without campus-based authentication systems, the consortia may provide authentication and proxy services. Access management schemes must be adaptable to a variety of third-party intermediate arrangements and changes in license agreements.

Widespread adoption of technology will undoubtedly stimulate further change. Access management systems must adapt to rights regimes around the world as global access to information becomes feasible from more countries. The scope of publications considered during tenure review is also likely to change. One participant urged the community represented in the room to persuade university presidents that the tenure process is possible without paying exorbitant sums to publishers. Whether or not they are persuaded, the growing


-24-

importance of the "grey" literature (such as electronic preprints) in some disciplines will undoubtedly affect the perspective of both users and scholarly publishers.


Accommodating ambiguity

The 1996 workshop on Technology of Terms and Conditions revealed the ambiguities and uncertainties inherent in copyright and related law. Systems developers were surprised to learn that laws often allow for flexible interpretations (in other words, are intentionally ambiguous), with the expectation that different interpretations will be tested in the courts and evaluated in the light of practical experience and other laws. Workshop participants devoted considerable attention to the ambiguities that might affect the design of access management systems, most of which have already been noted in this report but merit repeating.

License agreements can clarify some ambiguities, but not others. The rights pertaining to the historical materials Digital Library Federation members may propose to digitize for the Making of America project, for instance, may be impossible to ascertain. The moral rights of authors (in countries that recognize such rights) are not usually reflected in license agreements between libraries and publishers. Economic constraints may prevent publishers from establishing unambiguously the rights associated with illustrations and other subcomponents in old publications that are now being made available in electronic form. Like the participants in the Making of America project, they must find a way to assess and manage the risk. The original creators may or may not be interested in asserting any rights, depending on the age and nature of the works, the purpose of the use, and the current commercial viability of the works.

Another ambiguity relates to exceptions and limitations to intellectual property rights afforded by laws. Exceptions are usually based on the purpose of use and its effects on any market for the protected work. At the point at which access is controlled, users may not even know how they propose to use the work (beyond ascertaining whether it is of interest at all). In the view of workshop participants, it would be unreasonable and an invasion of privacy to require users to declare why they were accessing a work. A case in point might be researchers who are unwilling to explain their interest in a particular research topic when preparing a grant proposal or in existing patents in an area in which they have developed patentable technology. Users searching MEDLINE to research a serious medical condition may not wish to disclose that they or a family member have health problems. There is no way to enforce the fair use provisions of U.S. copyright law on the basis of characteristics of users. Each case is judged on its merits.


-25-


Conclusions

The workshop on access management held in Washington, D. C., on April 6, 1998, yielded several conclusions worth highlighting. It identified the need for research and evaluation of prototype projects in two key areas: system usability and economic models. The design of access management systems should be based on a better understanding of how users interact with such systems, what new information types will meet user needs, and what function these types perform in the emerging digital environment. To establish a viable economic balance for publishers, libraries and other intermediaries and users in the academic community, new standards of measure must be found to assess the usage of digital resources and thereby to develop alternative pricing schemes and payment mechanisms.

In addition, workshop participants identified five key properties for access management systems that would make them acceptable to users and libraries while respecting the rights and interests of authors and publishers. [9]

  • Simplicity. The less complex a system of access management, the more readily it can be adopted technologically and organizationally, and the more acceptable it is to all involved in its implementation.
  • Privacy. Systems that manage access to the cultural record must protect the privacy of users from detailed tracking and disclosure of use. User privacy must not be compromised.
  • Good faith. Agreements on access to scholarly information rely on trust among the parties involved. Users and providers would each prefer to depend, in an access management system that implements these agreements, on reasonable barriers against abuse rather than complex restrictions that inhibit use.
  • Trusted intermediaries. Intermediaries play an essential role in providing access to the cultural record as parties trusted by both users and providers and as efficient aggregators of distribution and usage. System design must take the role of intermediaries into account.
  • Reasonable terms. Access management systems and license agreements must recognize the distinction between access and use. Overly tight control of access to a resource may impose inappropriate constraints on its use, especially in teaching and research contexts. The most useful system will not limit access to specific user groups known in advance to be interested in a resource but will be reasonably open to serving unlikely users whose curiosity and research interests may lead them in directions not predicted by those responsible for making the agreements or designing the systems.

The findings of this workshop are relevant to a wide range of interested parties:


-26-

  • policy makers involved in making decisions on managing digital data in relation to questions of privacy;
  • legal experts who draft contracts and licenses which must be implemented through technical mechanisms for authentication and authorization;
  • technologists designing new software for controlling electronic use and mis-use; and
  • publishers and librarians, who, as major providers of information, play a central role in striking a balance between protecting copyright and providing access to the cultural record of knowledge.

Although the workshop focused primarily on the means of managing access to published knowledge in digital form in the context of the research library, it also made clear the much larger dimensions of access management issues. With the enormous growth in digital records of every form, the issues of privacy, protection, authorization, and authentication are fast becoming a concern for all citizens.


References

9 Gerry Bernbom provided this useful summary of design properties in correspondence with Donald Waters, July 29, 1998.





-27-


Appendix A: Workshop Participants



-28-


-29-

Caroline Arms
NDLP Program Coordinator
National Digital Library Program
Library of Congress
101 Independence Avenue SE
Washington, DC 20540-9300
Phone: (202) 707-0105
Fax: (202) 707-0955
E-Mail: caar@loc.gov
Dennis Cromwell
Chief Scientist, Advanced Technology Lab
University Information Technology Systems
Indiana University
2711 East Tenth Street
Bloomington, Indiana 47408
Phone: (812) 855-7326
Fax: (812) 855-7868
Email: dcromwel@indiana.edu
URL: http://ezinfo.ucs.indiana.edu/~dcromwel/home.html
William Y. Arms
Vice President
Corporation for National Research Initiatives
1895 Preston White Drive
Reston, Virginia 20191
Phone: (703) 620-8990
Fax: (703) 620-0913
Email: warms@cnri.reston.va.us
John Erickson, Ph.D.
VP-Rights Technologies
Yankee Rights Management
999 Maple Street
Contoocook, NH 03229
Phone: (802) 649-1847
Fax: (802) 649-2193
Email: jerickson@ybp.com
URL: http://www.ybp.com/yrm
Ross Atkinson
Deputy University Librarian
Olin Library
Cornell University
Ithaca, NY 14853
Phone: (607) 255-3393
Fax: (607) 255-9346
E-mail: ra13@cornell.edu
Eric G. Ferrin
Director of Library Computer Services
8E Pattee Library
University Park, PA 16802
Phone: (814) 865-1818
Fax: (814) 863-3560
E-mail: egf@psu.edu
Gerry Bernbom
Special Assistant for Digital Libraries and Distance Education
Office of the Vice President for Information Technology
Indiana University
2711 East Tenth Street
Bloomington, Indiana 47408
Phone: (812) 855-4624
Fax: (812) 855-3310
E-mail: bernbom@indiana.edu
Les Gasser
Director, Computation & Social Systems
Division of Information and Intelligent Systems
National Science Foundation
4201 Wilson Boulevard, Room 1115
Arlington, VA 22230
Phone: (703) 306-1927
E-mail: lgasser@nsf.gov
Bernie Hurley
Chief Scientist
The UC Berkeley Library
Rm. 245, Doe Library
Berkeley, CA 94720-6000
Phone: (510) 642-3773
Fax: (510) 643-8179
E-mail: bernie@library.berkeley.edu
Mary Berghaus Levering
Associate Register for National Copyright Programs
U.S. Copyright Office
Library of Congress
Washington, DC 20540-6007
Phone: (202) 707-8350
Fax: (202) 707-8366
E-mail: mlev@loc.gov
Peter Jaszi
Washington College of Law
American University
4801 Mass Avenue
Washington, D.C.
Phone: (202) 274-4216
E-mail: pjaszi@american.edu
Melissa Smith Levine
Legal Advisor, National Digital Library Program
Library of Congress
Washington, D.C. 20540-1300
Phone: (202) 707-1783
Fax: (202) 707-0815
E-mail: mele@loc.gov
Andrea Keyhani
Manager, Publisher Relations
OCLC Online Computer Library Center
6565 Frantz Rd.
Dublin, OH 43017
Phone: (614) 764-6474
Fax: (614) 764-1640
E-mail: keyhani@oclc.org
Wendy P. Lougee
Asst. Director, Digital Library Initiatives
University of Michigan Library
818 Hatcher South
Ann Arbor, MI 41809-1205
Phone: (313) 764-8016
Fax: (313) 763-5080
E-mail: wlougee@umich.edu
URL: http://www-personal.umich.edu/~wlougee/
Dr. Judith L. Klavans
Director, Center for Research on Information Access
Research Scientist, Department of Computer Science
Columbia University
535 West 114th Street, MC 1103
New York, NY 10027
Phone: (212) 854-7443
Fax: (212) 854-9099
E-mail: klavans@cs.columbia.edu
URL: http://www.cs.columbia.edu/~klavans/home.html
Clifford Lynch
Executive Director
Coalition for Networked Information
21 Dupont Circle, Suite #800
Washington, DC 20036-1109
Phone: (202) 296-5098
E-mail: cliff@cni.org
Michael Lesk
Division Director
Division of Information and Intelligent Systems
National Science Foundation
4201 Wilson Boulevard, Room 1115
Arlington, VA 22230
Phone: (703) 306-1930
E-mail: mlesk@nsf.gov
Carol Mandel
Deputy University Librarian
510 Butler Library
Columbia University
535 West 114th Street
New York, NY 10027-7029
Phone: (212) 854-2226
Fax: (212) 854-9099
E-mail: mandel@columbia.edu
Charlene Mason
Associate University Librarian
499 Wilson Library
309 19th Avenue South
University of Minnesota Libraries
Minneapolis, MN 55455
Phone: (612) 624-4520
Fax: (612) 626-9353
E-mail: c-maso@tc.umn.edu
Terry Ryan
Associate University Librarian for Systems
11334 University Research Library
University of California at Los Angeles
Box 951575
Los Angeles, CA 90095-1575
Phone: (310) 825-1201
E-mail: tryan@library.ucla.edu
David Millman
Manager, Research & Development
Academic Information Systems
Columbia University
612 West 115 St
New York, NY 10025
Phone: (212) 854-4284
Fax: (212) 662-6442
E-mail: dsm@columbia.edu
Sarah E. Sully
General Counsel, Director of Publisher Relations
JSTOR
188 Madison Avenue
New York, NY 10016
Phone: (212) 592-7345
Fax: (212) 592-7355
E-mail: ss@jstor.org
URL: http://www.jstor.org
Ann Okerson
Associate University Librarian for Collections Development and Management
Yale University Library
New Haven, CT 06520-8240
Phone: (203) 432-1763
Fax: (203) 432-8527
E-mail: ann.okerson@yale.edu
Russell S. Vaught
Director, Center for Academic Computing
229 Computer Building
Pennsylvania State University
University Park, PA 16802
Phone: (814) 863-0421
Fax: (814) 863-7049
E-mail: rsv@psu.edu
URL: http://www.personal.psu.edu/rsv
Vicky Reich
Senior Librarian
Green Library
University Library and Information Resources
Stanford, CA 94305
Phone: (650) 725-1134
Fax: (650) 725-4902
E-mail: vreich@Sulmail.standford.edu
Donald Waters
Director, Digital Library Federation
Council on Library and Information Resources
205 Church Street, Third Floor
New Haven, CT 06510-1805
Phone: (203) 498-6076
Fax: (203) 498-6078
E-mail: dwaters@clir.org
URL: http://www.diglib.org


-30-


Appendix B: Suggested Readings

  • A report from a previous, related workshop
  • Core background materials for workshop on April 6
  • Related background readings
    • Arms, William Y., Christophe Blanchi, and Edward A. Overly. "An Architecture for Information in Digital Libraries." D-Lib Magazine, February 1997. Available from http://www.dlib.org/dlib/february97/cnri/02arms1.html.
    • Bide, Mark. "In Search of the Unicorn: The Digital Object Identifier from a User Perspective." A report for the British National Bibliography Research Fund, November 1997. Available from http://www.britain.eu.net/~bic/bicinfo.html.
    • Cross-Industry Working Team. "Managing Access to Digital Information: An Approach Based on Digital Objects and Stated Operations." May 1997. Available from http://www.xiwt.org/documents/ManagAccess/ManagAccessTOC.html.
    • Garrison, William V., and Gregory A. McClellan. "Authentication and Authorization, Part 2. Tao of Gateway: Providing Internet Access to Licensed Databases." Library Hi Tech vol. 15, no. 57-58 (1997): 39-54.
    • Kahn, Robert, and Robert Wilensky. "A Framework for Distributed Digital Object Services." May 1995. Available from http://www.cnri.reston.va.us/home/cstr/arch/k-w.html.

    • -31-

    • Lynch, Clifford A. "Authentication and Authorization, Part I. The Changing Role in a Networked Information Environment." Library Hi Tech, vol. 15, no 57-58, 1997: 30-38.
    • Machovec, George. "User Authentication and Authorization in a Networked Library Environment: Alliance Issues." November 1997. Available from http://www.coalliance.org/reports/security.html.
    • Paskin, Norman. "Information Identifiers." Learned Publishing, vol. 10, no.2 (April 1997): 135-56. Available from http://www.elsevier.co.jp/inca/homepage/about/infoident/.
    • Riddle, Bob. "The ICAAP Project, Part Two: The Web Architecture." Library Hi Tech, vol. 15, no. 57-58 (1997): 71-78.
    • Roscheisen, Martin, and Terry Winograd. "The Stanford FIRM Framework for Interoperable Rights Management." Forum on Technology-Based Intellectual Property Management. Interactive Media Association, White House Economic Council and White House Office of Science and Technology. Washington, D.C., 1997. Available from http://mjosa.stanford.edu/~roscheis/IMA/index.html.

-32-


Appendix C: Update on Related Legislative Activity

At the April 1996 workshop on access management, Peter Jaszi (Washington College of Law, American University) gave a summary of current legislative activity relating to intellectual property rights, drawing attention to some potential problems for libraries. March 1998 had seen considerable activity in Congress, under pressure from the commercial sector, particularly from the motion picture and sound industries. According to Jaszi, the leading legislative proposals made no significant distinctions for scholarly communication or academic use. His impression was that there was an inclination to pass bills within the forty legislative days then left in the current session of Congress.

The proposals dealt with three issues, all of which had been under legislative consideration for more than two years: copyright term extension [HR 2589], database protection [HR2652], andWIPO implementation [HR 2281, Coble]. All three proposals had been reported out of the House Subcommittee on Courts and Intellectual Property and the House Judiciary Committee for floor action. HR 2589 had been referred to the Senate Judiciary Committee. Jaszi indicated that the Senate Judiciary Committee was considering passing the bills on for floor action without full consideration within the committee.


Term extension

HR 2589 would add 20 years of copyright protection for works currently under copyright protection. The extension would not apply to works for which copyright has already expired. The new copyright term would be the life of the author plus 70 years. The proposal included no concessions for academic use. According to Jaszi, the exemption for libraries and archives in relation to making copies of out-of-print works, for purposes of preservation, scholarship, or research, during the last 20 years of protection was weak.


Database protection

HR 2652 (the Collections of Information Antipiracy Act) proposed a new right for databases that are simply compilations but require significant investment. Based on principles of unfair competition rather than copyright, this bill was partly in response to the decision in Feist Publications v. Rural Telephone Service Co. Inc, [499 U.S. 340, 18 USPQ2d 1275(1991), 41 PTJC 443, 453]. Feist denied copyright protection to compilations, unless there is value added through selection, coordination, or arrangement. As written, this new protection for databases would apply to any information that can be organized systematically, including facts, numerical data, and works of authorship. Penalties would apply to those who damaged the actual or potential market for a protected database by extracting data. These penalties would apply to end users as well as to commercial re-users, although an amendment provides partial protection for nonprofit organizations. The period of protection is 15 years.


-33-

In response to a question, Jaszi confirmed that there is no associated requirement for deposit (as there is, under mandatory deposit regulations, for most published works protected by copyright). Jaszi reported that the exemptions for scientific and academic use have been described as ineffective.


WIPO implementation

HR 2281 would provide reasonable prohibitions and penalties relating to tampering with copyright management information. In addition, it included prohibitions against circumvention of copyright protection schemes, whatever the motivation. Jaszi regarded it as significant that the bill did not reaffirm the principle of fair use, offered no exemptions for digital preservation by libraries or distance education, and provided no preemption of contract terms by constitutional privileges or federal law. Jaszi noted that a pair of companion bills suggested an alternative approach to conformance with the World Intellectual Property Organization treaty that addressed many of these concerns. These are Senator John Aschroft's (R-MO) Digital Copyright Clarification and Technology Act (S 1146) in the Senate and the Digital Era Copyright Enhancement Act (HR 3048), introduced by Reps. Rick Boucher (D-VA) and Tom Campbell (R-CA) in the House.

Jaszi noted that the committee actions on HR 2652 and HR 2281 were very recent. For updates, he recommended consulting the Web site of the Digital Future Coalition, which represents many library organizations, at http://www.dfc.org/.


-34-


Appendix D: Definitions

The following definitions have been compiled from those used by Waters and the other presenters at this workshop, by the DOI Rights Metadata Working Group, and by Clifford Lynch in the draft CNI White Paper.

Terms with an asterisk are used in figure 4, which was drawn up following the workshop as a result of discussions among Donald Waters, John Erickson, William Arms, and Caroline Arms. Figure 4 combines elements of diagrams presented by Waters and Erickson at this workshop (figures 2 and 3) and in William Arms's February 1998 article in D-Lib Magazine, "Implementing Policies for Access Management." The grey boxes represent components of an automated authorization system, whereas the white boxes represent the interactions between users and providers in the external environment or between either party and the access management system.


Access Management

Access management is a process mediated by information managers by which users gain authorized access to the intellectual property of creators/owners/providers. Access management systems make use of authentication and authorization services to enable or control access to and use of a networked resource.


*Agreements

In figure 4, the term agreements refers to licenses and other legal agreements, entered into by or on behalf of users with information providers. Agreements may be made in different ways, for example, through formal contract or acceptance of terms at time of access.


-35-

Within an automated access management system, the agreement and applicable laws will be implemented through a set of policy rules.

The DOI Rights Metadata Working Group uses the term both for a legal agreement between the parties and the corresponding representation of rules that control access within a system. For that group, "an Agreement is a statement of permitted operations, and applicable terms, for a given object or set of objects, and a given user or set of users. The default Agreement is that for 'all users', probably permitting a limited set of operations at standard fees. A site license that is already in place would be a specific Agreement."


*Authentication of users

Authentication is the process whereby a network user establishes a right to an identity or name (such as a user ID, or credit card number). A user can establish this right through

  • something he or she knows (user ID and password),
  • something he or she has (ID card), or
  • something he or she is (handprint or retina scan).


*Authenticity of content

The authenticity of digital content requires mechanisms to assure users that content has not been corrupted. Since digital content is easily manipulated in ways that cannot be easily detected, users will expect publishers and third party custodians of information to provide assurances of authenticity.


*Authorization

Authorization is the process of determining whether an identity (given a set of role attributes associated with that identity) is permitted to perform some action, such as accessing a resource. The identity may represent a particular individual or be anonymous or pseudonymous. In the context of access management, authorization will rely on access policy rules, role attributes of the user, and terms and conditions attributes of a digital object to determine whether the desired action is permitted and how to disseminate the material.


Credential

In the context of access management, a credential is something that a user can present to an authorization system operated by an information provider as evidence of legitimacy. One form of credential is a user ID together with password. Another is a digital certificate following the X.509 standard. Support for transmitting such certificates and using them to control access is being incorporated into the latest versions of Web browsers and Web servers. See the CNI White Paper for more discussion.


-36-


*Object attributes

If access to certain digital material is to be managed, metadata attributes must be associated with each digital content object to indicate what terms and conditions apply to that object. An attribute would typically indicate a class of material to which an object belongs, with a common set of terms and conditions applying to all material in that class.


Operation

In the context of access management, an operation is any act that can be done with an object, internal or external, to a given computer system. Examples: view, print, save; modify, redistribute. (This definition is from the DOI Rights Metadata Working Group.) The word action is sometimes used in roughly the same way.


*Policy rules

Within in an access management system, policy rules are encoded to determine whether a user is entitled to access the digital object being requested and whether the requested operation is permitted. Policy rules operationalize agreements, such as licenses, and applicable law.


Proxy

In the context of access management, a proxy is a special computer that acts as a gateway to one or more resources. The licensee organization (or its agent) typically deploys a proxy. The proxy relies on authentication services to establish the legitimacy of a user and then routes all traffic between that user and the licensed resource. See the CNI White Paper for more discussion.


*Role

In the context of access management, role is specified by attributes associated with a user's identity. Examples of role attributes are: membership in a university community, fulltime student, or individual subscriber to a scholarly journal. Authorization mechanisms use role attributes to determine whether a user is permitted to perform certain actions or operations on a resource or content object.


*Use

Use of a digital resource may extend beyond the operations performed online by a user when accessing a digital object. A faculty member who has printed a copy of an article may, for example, use it for personal reference or to make fifty copies for distribution to a class. Access management systems can limit access and have the potential to limit online operations; systems cannot fully control subsequent use.

return to top >>