Search results

1 – 5 of 5
Open Access
Article
Publication date: 6 September 2021

Gerd Hübscher, Verena Geist, Dagmar Auer, Nicole Hübscher and Josef Küng

Knowledge- and communication-intensive domains still long for a better support of creativity that considers legal requirements, compliance rules and administrative tasks as well…

825

Abstract

Purpose

Knowledge- and communication-intensive domains still long for a better support of creativity that considers legal requirements, compliance rules and administrative tasks as well, because current systems focus either on knowledge representation or business process management. The purpose of this paper is to discuss our model of integrated knowledge and business process representation and its presentation to users.

Design/methodology/approach

The authors follow a design science approach in the environment of patent prosecution, which is characterized by a highly standardized, legally prescribed process and individual knowledge study. Thus, the research is based on knowledge study, BPM, graph-based knowledge representation and user interface design. The authors iteratively designed and built a model and a prototype. To evaluate the approach, the authors used analytical proof of concept, real-world test scenarios and case studies in real-world settings, where the authors conducted observations and open interviews.

Findings

The authors designed a model and implemented a prototype for evolving and storing static and dynamic aspects of knowledge. The proposed solution leverages the flexibility of a graph-based model to enable open and not only continuously developing user-centered processes but also pre-defined ones. The authors further propose a user interface concept which supports users to benefit from the richness of the model but provides sufficient guidance.

Originality/value

The balanced integration of the data and task perspectives distinguishes the model significantly from other approaches such as BPM or knowledge graphs. The authors further provide a sophisticated user interface design, which allows the users to effectively and efficiently use the graph-based knowledge representation in their daily study.

Details

International Journal of Web Information Systems, vol. 17 no. 6
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 15 August 2022

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…

5756

Abstract

Purpose

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.

Design/methodology/approach

This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.

Findings

The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.

Originality/value

Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 August 2006

Michael Engelhardt, Arne Hildebrand, Dagmar Lange and Thomas C. Schmidt

The paper, aims to introduce an educational content management system Hypermedia Learning Objects System (hylOs), which is fully compliant to the IEEE LOM eLearning object…

Abstract

Purpose

The paper, aims to introduce an educational content management system Hypermedia Learning Objects System (hylOs), which is fully compliant to the IEEE LOM eLearning object metadata standard. Enabled through an advanced authoring toolset, hylOs allows the definition of instructional overlays of a given eLearning object mesh.

Design/methodology/approach

In educational content management, simple file distribution is considered insufficient. Instead, IEEE LOM standardised eLearning objects have been well established as the basic building blocks for educational online content. They are nicely suited for self‐explorative learning approaches within adaptive hypermedia applications. Even though eLearning objects typically reside within content repositories, they may propagate metadata relations beyond repository limits. Given the explicit meaning of these interobject references, a semantic net of content strings can be knotted, overlaying the repository infrastructure.

Findings

Based on a newly introduced ontological evaluation layer, meaningful overlay relations between knowledge objects are shown to derive autonomously. A technology framework to extend the resulting semantic nets beyond repository limits is also presented.

Research limitations/implications

This paper provides proof of concept for the derivation and use of semantic content networks in educational hypermedia. It thereby opens up new directions for future eLearning technologies and pedagogical adoption.

Practical implications

The paper illustrates capabilities of the hylOs eLearning content management. The hylOs is built upon the more general Media Information Repository (MIR) and the MIR Adaptive Context Linking Environment (MIRaCLE): its linking extension. MIR is an open system supporting the standard XML, CORBA and JNDI. hylOs benefits from manageable information structures, sophisticated access logic and high‐level authoring tools like the eLO editor responsible for the semi‐manual creation of meta data and WYSIWYG like XML–content editing, allowing for rapid distributed content development.

Originality/value

Over the last few years, networking technologies and distributed information systems have moved up the OSI layer and are established well within application‐centric middleware. Most recently, content overlay networks have matured, incorporating the semantics of data files into their self‐organisational structure with the aim of optimising data‐centric distributed indexing and retrieval. This paper elaborates a corresponding concept of semantic structuring for educational content objects. It introduces and analyses the autonomous generation and educational exploitation of semantic content nets, providing proof of concept by a full‐featured implementation within the hylOs educational content management system.

Details

Campus-Wide Information Systems, vol. 23 no. 4
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 1 April 1981

New Derwent representation in North America. Effective mid July, 1981, Derwent Publications Limited will be represented in the USA and Canada by a new company:

Abstract

New Derwent representation in North America. Effective mid July, 1981, Derwent Publications Limited will be represented in the USA and Canada by a new company:

Details

Online Review, vol. 5 no. 4
Type: Research Article
ISSN: 0309-314X

1 – 5 of 5