Journal of
Systemics, Cybernetics and Informatics
HOME  |   CURRENT ISSUE   |   PAST ISSUES   |   RELATED PUBLICATIONS     IIIS   |   SEARCH     CONTACT US
 


ISSN: 1690-4524 (Online)


Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals), ), Academic Journals Database, and Google Scholar


Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory


Re-Published in
Academia.edu
(A Community of about 10.000.000 Academics)


Editorial Advisory Board's Chair
William Lesso

Editor-in-Chief
Nagib C. Callaos


Sponsored by
The International Institute of
Informatics and Systemics

www.iiis.org

 

Editorial Advisory Board

Journal's Reviewers
 

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology


Zooming in, Zooming Out: A Framework for Hierarchical Genetic Algorithms
Jennifer Seitzer
(pages: 1-5)

Perceptions of Electronic Health Records in Mississippi
Jennifer L. Styron, Barry Cumbie
(pages: 6-12)

A Problem-Solving Approach to Teaching Creativity for Engineering and Other Disciplines
Chelsey Bradford, Zachary Balgeman, Fernando Aguilar, Sami Khorbotly, Mark M. Budnk
(pages: 13-17)

Measurement of Flow Properties of Mammalian Blood with Different Hematocrit Values Using Falling Needle Rheometer
Takamasa Suzuki, Sadao Araki, Hideki Yamamoto, Kimito Kawamura, Hiroko Aida, Dominik Bernitzky, Roberto Plasenzotti
(pages: 18-20)

New FACTS Equipment in an Enhanced Version of Smart Grids. The Magnetic Gate
Julio Enrique Posada C.
(pages: 21-25)

Analysis of Air Flow Past and through the 2415-3S Airfoil for an Unmanned Aerial Vehicle with Internal Propulsion System
Luis D. Mendoza, Jirí Nožicka
(pages: 26-31)

Cognitive Analytics: A Step Towards Tacit Knowledge?
Fred A. Maymir-Ducharme, Lee A. Angelelli
(pages: 32-38)

Comparison of Alternative Processes for Support Decisions
Manuel Martínez-Álvarez, Sandra-Dinora Orantes-Jiménez, Graciela Vázquez-Álvarez
(pages: 39-46)

Extensive Investigations on Bio-Inspired Trust and Reputation Model over Hops Coefficient Factor in Distributed Wireless Sensor Networks
Vinod Kumar Verma
(pages: 47-52)

Water Quantity Prediction Using Least Squares Support Vector Machines (LS-SVM) Method
Nian Zhang, Charles Williams, Pradeep Behera
(pages: 53-58)

Specification of Requirements for Visually Impaired Persons in Services in Transportation Electronic Information System
Michal Jerabek, Jan Krcal, Tomas Zelinka
(pages: 59-63)

Telematics System dedicated for Provisioning of On-Line Information about Predicted Occupancy of Highway Parking Areas
Tomas Zelinka, Michal Jerabek, Martin Srotyr, Zdenek Lokaj, Petr Kumpost
(pages: 64-68)

Insights from Massively Multiplayer Online Role Playing Games to Enhance Gamification in Education
Alireza Tavakkoli, Donald Loffredo, Mark Ward Sr.
(pages: 69-78)

Evaluation of Uncertainty on the Stages of Business Cycle: Implementation of Quantum Principles
Anna Svirina, Elena Parfenova, Elena Shurkina
(pages: 79-85)

The Major Milestones to Constitute SINTONÍA, an Institute for Collaboration (IFC)
Judith Cortés Zurita, José Pablo Nuño
(pages: 86-90)


 

Abstracts

 


ABSTRACT


Implementation of Hierarchical Authorization For A Web-Based Digital Library

Andreas Geyer-Schulz, Anke Thede


Access control mechanisms are needed in almost every system nowadays to control what kind of access each user has to which resources and when. On the one hand access control systems need to be flexible to allow the definition of the access rules that are actually needed. But they must also be easy to administrate to prevent rules from being in place without the administrator realizing it. This is particularly difficult for systems such as a digital library that requires fine-grained access rules specifying access control at a document level. We present the implementation and architecture of a system that allows definition of access rights down to the single document and user level. We use hierarchies on users and roles, hierachies on access rights and hierarchies on documents and document groups. These hierarchies allow a maximum of flexibility and still keep the system easy enough to administrate. Our access control system supports positive as well as negative permissions.

Full Text