Authentication & Access
ACM uses an organization’s outward facing IP addresses as a means to identify users coming from a subscribing institution and in turn authenticate access to the ACM Digital Library. Using IP authentication allows ACM to offer access to the Digital Library for everyone belonging to an organization without need of usernames/password.
Proxy Servers and EzProxy
T ACM Digital Library
Shibboleth (http://shibboleth.internet2.edu/about.html) is an open source software package that allows an individual to use a single username/login to access multiple online resources which are subscribed to by their institution. Currently, ACM supports Shibboleth authentication so users can login to the ACM Digital Library directly using their Shibboleth credentials.
Librarians interested in gaining access via Shibboleth for their institution need to provide following information to firstname.lastname@example.org:
- The federation your institution belongs to
- The institution Entity ID
- List any scope affiliation
Search Engines Indexing the DL
ACM proactively works with the search engines Google, Bing and Yahoo! to ensure that all of ACM’s publications, including the full text of articles, are indexed by these services. This allows users to use these search engines to discover key words included in ACM’s publications. So a user of Google Scholar can run a search for computer science and find the results in the full text of an ACM publication and in turn have the option of being redirected to the full text of the article within the Digital Library. ACM allows the DL to be indexed by other approved internet search engines and federated search engines.
ACM's prestigious conferences and journals seek top-quality papers in all areas of computing and IT. It is now easier than ever to find the most appropriate venue for your research and publish with ACM.
Written by leading domain experts for software engineers, ACM Case Studies provide an in-depth look at how software teams overcome specific challenges by implementing new technologies, adopting new practices, or a combination of both. Often through first-hand accounts, these pieces explore what the challenges were, the tools and techniques that were used to combat them, and the solution that was achieved.