An MCDA cause-effect factors model for the implementation of Greenstone Digital Library software

S Rathee, A Kumar, S Kaushik… - Management …, 2020 - emerald.com
Purpose The selection of effective library software not only plays an important role for
students, academic staff and the library staff but also helps an institution by having the library …

Access Policies in Institutional Digital Repositories: Analysis of Global Trends

BK Roy, SC Biswas, P Mukhopadhyay - International Journal of …, 2023 - ijism.isc.ac
This paper compared and contrasted the open access (OA) self-archiving policies of
different organizations registered in OpenDOAR, ROAR and ROARMAP databases. It …

[PDF][PDF] Internet usage and regulations in Niger Delta University libraries

PA Tiemo, E Bribena, O Nwosu - An International Electronic …, 2011 - white-clouds.com
The study examines the Internet usage and regulations in Niger Delta University Libraries.
The descriptive research design was used for this study. 404 Internet users were randomly …

[PDF][PDF] Institutional repository for global knowledge sharing

CM Nneka, C Kaosisochukwu - Journal of ICT …, 2021 - credence-publishing.com
An institutional repository is an archive for collecting, preserving, and disseminating digital
copies of the intellectual output of an institution. It is a new concept for collecting, managing …

Attribute based access control in DSpace

H Anwar, MA Shibli - 2012 7th International Conference on …, 2012 - ieeexplore.ieee.org
Authorization is an important security aspect that needs to be taken care of when access on
sensitive resources has to be restricted. In Institutional Digital Repository Systems …

Utveckling av webbapplikation: med fokus kring rättigheter och autentisering i en isolerad miljö

J Lindgren - 2022 - diva-portal.org
Detta arbete har utförts med samarbete med företaget IPBNorr där en webbapplikation skall
utvecklas i syftet att två separata verktyg skall centraliseras för utökad användarvänlighet …

[PDF][PDF] Year of Publication: 2021

TM Rugendo, AM Kahonge - 2021 - academia.edu
With rapid development and adoption of virtualization technology, security concerns have
become more prominent. Access control is the focal point when it comes to security. Since, it …

[PDF][PDF] Project Semester Report

A Sharma - 2019 - appforms.thapar.edu
Questa SIM is based on Power Aware simulation which enables you to perform functional
verification of low-power designs together with the power management structure defined by …

[PDF][PDF] Access control model for container-based virtual environment

TM Rugendo - 2018 - erepository.uonbi.ac.ke
Access control model for container-based virtual environment Page 1 UNIVERSITY OF
NAIROBI SCHOOL OF COMPUTING AND INFORMATICS ACCESS CONTROL MODEL FOR …