Authentication & Access
ACM uses an organization’s outward facing IP addresses as a means to identify users coming from a subscribing institution and in turn authenticate access to the ACM Digital Library. Using IP authentication allows ACM to offer access to the Digital Library for everyone belonging to an organization without need of usernames/password.
Proxy Servers and EzProxy
Many libraries use proxy servers as a tool to help authenticate offsite users who are unable to be authenticated by an institution’s IP address. ACM allows libraries to include the IPs addresses for their proxy servers, including OCLC’s EzProxy tool, to be included in the list of their outward facing IP addresses. In addition, ACM can handle the “X-Forwarded-For” http header field when a library shares a proxy server with another group that does not license the DL or when the Proxy IP address cannot be predicted.
Sample EzProxy Configuration:
T ACM Digital Library
Shibboleth (http://shibboleth.internet2.edu/about.html) is an open source software package that allows an individual to use a single username/login to access multiple online resources which are subscribed to by their institution. Currently, ACM supports Shibboleth authentication so users can login to the ACM Digital Library directly using their Shibboleth credentials.
Librarians interested in gaining access via Shibboleth for their institution need to provide following information to email@example.com:
- The federation your institution belongs to
- The institution Entity ID
- List any scope affiliation
Search Engines Indexing the DL
ACM proactively works with the search engines Google, Bing and Yahoo! to ensure that all of ACM’s publications, including the full text of articles, are indexed by these services. This allows users to use these search engines to discover key words included in ACM’s publications. So a user of Google Scholar can run a search for computer science and find the results in the full text of an ACM publication and in turn have the option of being redirected to the full text of the article within the Digital Library. ACM allows the DL to be indexed by other approved internet search engines and federated search engines.
ACM Queue’s “Research for Practice” is your number one resource for keeping up with emerging developments in the world of theory and applying them to the challenges you face on a daily basis. RfP consistently serves up expert-curated guides to the best of CS research, and relates these breakthroughs to the challenges that software engineers face every day. In this installment of RfP is by Nitesh Mor, a PhD candidate at UC Berkeley working on the next generation of globally distributed computer systems with a special focus on data security and privacy. Titled “Edge Computing,” this RfP gives an overview of some of the most exciting work being done in the area of computing infrastructures and applications. It provides an academic view of edge computing through samples of existing research whose applications will be highly relevant in the coming years.
ACM's prestigious conferences and journals are seeking top-quality papers in all areas of computing and IT. It is now easier than ever to find the most appropriate venue for your research and publish with ACM.
Written by leading domain experts for software engineers, ACM Case Studies provide an in-depth look at how software teams overcome specific challenges by implementing new technologies, adopting new practices, or a combination of both. Often through first-hand accounts, these pieces explore what the challenges were, the tools and techniques that were used to combat them, and the solution that was achieved.