Journal of
Systemics, Cybernetics and Informatics
HOME  |   CURRENT ISSUE   |   PAST ISSUES   |   RELATED PUBLICATIONS     IIIS   |   SEARCH     CONTACT US
 


ISSN: 1690-4524 (Online)


Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals), ), Academic Journals Database, and Google Scholar


Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory


Re-Published in
Academia.edu
(A Community of about 10.000.000 Academics)


Editorial Advisory Board's Chair
William Lesso

Editor-in-Chief
Nagib C. Callaos


Sponsored by
The International Institute of
Informatics and Systemics

www.iiis.org

 

Editorial Advisory Board

Journal's Reviewers
 

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology


A Proposal for Stress Management Using Serious Games Associated to Virtual and Augmented Reality
Renato de Aquino Lopes, Alexandre Cardoso, Edgard A. Lamounier Júnior, Ederaldo José Lopes
(pages: 1-7)

Comparative Student Success Analysis of Distance Education and Traditional Education in Associate Degree Programs
Gizem Ilyas, Sinan Ilyas, Hayrettin Evirgen
(pages: 8-12)

Proposal for a Similar Question Search System on a Q&A Site
Katsutoshi Kanamori, Akinori Kanda, Hayato Ohwada
(pages: 13-16)

Discovering Interdisciplinary Uses of Online Technologies in Higher Education
Mary Caton-Rosser, Barbara Looney, Kaitlin Schneider
(pages: 17-21)

Recognizing the Need for Rich Contextualization in the Classroom and Applying it with Modified Bloom's Cognitive Domain Taxonomy for Successful Teaching of Physics 106 (Physics II – Electricity, Magnetism and Light)
Matthew E. Edwards
(pages: 22-28)

Democracy, Political Perceptions, and New Media
Houman Sadri, Madelyn Flammia
(pages: 29-33)

Empirical Studies of Agile Software Development to Learn Programming Skills
Yasuyo Kofune, Takahiro Koita
(pages: 34-37)

Bring Your Own Technology (BYOT) to Education
Joseph M. Woodside, Shahram Amiri
(pages: 38-40)

Detect of Sublethal Damage with Cyclic Deformation of Erythrocyte in Shear Flow
Hashimoto Shigehiro
(pages: 41-46)

Effect of Micro Ridges on Orientation of Cultured Cell
Hino Haruka, Hashimoto Shigehiro, Sato Fumihiko
(pages: 47-53)

Improvement of the Response Time in an Open Source Audioconference Architecture Based on SIP Multicast Implemented with JainSIP, JainSDP and JGAP Libraries
Moreno Carlos M., Álvarez Maribel
(pages: 54-59)

Online Teaching and Learning at the Graduate School Level: Student Perceptions on Discussion Boards v. Synchronous Communication
Amos Sr. Christopher N.
(pages: 60-65)

New CA Based Image Encryption-Scaling Scheme Using Wavelet Transform
Jeyaram Bala Suyambu, Raghavan Rama
(pages: 66-71)

New Optoelectronic Technology Simplified for Organic Light Emitting Diode (OLED)
Guedes Andre F. S., Guedes Vilmar P., Tartari Simone, Souza Mônica L., Cunha Idaulo J.
(pages: 72-74)

Interprofessional Collaborative Practice to Improve Patient Outcomes: A Pilot Study
Styron Jennifer, Dearman Catherine, Whitworth Sheila, Brown Henrietta
(pages: 75-81)

Corporate Governance as a Crucial Factor in Achieving Sustainable Corporate Performance
Bistrova Julija, Lace Natalja, Tvaronaviciene Manuela
(pages: 82-88)


 

Abstracts

 


ABSTRACT


Implementation of Hierarchical Authorization For A Web-Based Digital Library

Andreas Geyer-Schulz, Anke Thede


Access control mechanisms are needed in almost every system nowadays to control what kind of access each user has to which resources and when. On the one hand access control systems need to be flexible to allow the definition of the access rules that are actually needed. But they must also be easy to administrate to prevent rules from being in place without the administrator realizing it. This is particularly difficult for systems such as a digital library that requires fine-grained access rules specifying access control at a document level. We present the implementation and architecture of a system that allows definition of access rights down to the single document and user level. We use hierarchies on users and roles, hierachies on access rights and hierarchies on documents and document groups. These hierarchies allow a maximum of flexibility and still keep the system easy enough to administrate. Our access control system supports positive as well as negative permissions.

Full Text