An MCDA cause-effect factors model for the implementation of Greenstone Digital Library software
Purpose The selection of effective library software not only plays an important role for
students, academic staff and the library staff but also helps an institution by having the library …
students, academic staff and the library staff but also helps an institution by having the library …
Access Policies in Institutional Digital Repositories: Analysis of Global Trends
This paper compared and contrasted the open access (OA) self-archiving policies of
different organizations registered in OpenDOAR, ROAR and ROARMAP databases. It …
different organizations registered in OpenDOAR, ROAR and ROARMAP databases. It …
[PDF][PDF] Internet usage and regulations in Niger Delta University libraries
PA Tiemo, E Bribena, O Nwosu - An International Electronic …, 2011 - white-clouds.com
The study examines the Internet usage and regulations in Niger Delta University Libraries.
The descriptive research design was used for this study. 404 Internet users were randomly …
The descriptive research design was used for this study. 404 Internet users were randomly …
[PDF][PDF] Institutional repository for global knowledge sharing
CM Nneka, C Kaosisochukwu - Journal of ICT …, 2021 - credence-publishing.com
An institutional repository is an archive for collecting, preserving, and disseminating digital
copies of the intellectual output of an institution. It is a new concept for collecting, managing …
copies of the intellectual output of an institution. It is a new concept for collecting, managing …
Attribute based access control in DSpace
H Anwar, MA Shibli - 2012 7th International Conference on …, 2012 - ieeexplore.ieee.org
Authorization is an important security aspect that needs to be taken care of when access on
sensitive resources has to be restricted. In Institutional Digital Repository Systems …
sensitive resources has to be restricted. In Institutional Digital Repository Systems …
Utveckling av webbapplikation: med fokus kring rättigheter och autentisering i en isolerad miljö
J Lindgren - 2022 - diva-portal.org
Detta arbete har utförts med samarbete med företaget IPBNorr där en webbapplikation skall
utvecklas i syftet att två separata verktyg skall centraliseras för utökad användarvänlighet …
utvecklas i syftet att två separata verktyg skall centraliseras för utökad användarvänlighet …
[PDF][PDF] Year of Publication: 2021
TM Rugendo, AM Kahonge - 2021 - academia.edu
With rapid development and adoption of virtualization technology, security concerns have
become more prominent. Access control is the focal point when it comes to security. Since, it …
become more prominent. Access control is the focal point when it comes to security. Since, it …
[PDF][PDF] Project Semester Report
A Sharma - 2019 - appforms.thapar.edu
Questa SIM is based on Power Aware simulation which enables you to perform functional
verification of low-power designs together with the power management structure defined by …
verification of low-power designs together with the power management structure defined by …
[PDF][PDF] Access control model for container-based virtual environment
TM Rugendo - 2018 - erepository.uonbi.ac.ke
Access control model for container-based virtual environment Page 1 UNIVERSITY OF
NAIROBI SCHOOL OF COMPUTING AND INFORMATICS ACCESS CONTROL MODEL FOR …
NAIROBI SCHOOL OF COMPUTING AND INFORMATICS ACCESS CONTROL MODEL FOR …