A Model of a Distributed Information System based on the Z39.50 Protocol

S. Serikbayeva, J. Tussupov, M. Sambetbayeva, A. Yerimbetova, G.B. Borankulova, A. Tungatarova
{"title":"A Model of a Distributed Information System based on the Z39.50 Protocol","authors":"S. Serikbayeva, J. Tussupov, M. Sambetbayeva, A. Yerimbetova, G.B. Borankulova, A. Tungatarova","doi":"10.54039/ijcnis.v13i3.5122","DOIUrl":null,"url":null,"abstract":"Based on the analysis of typical scenarios of information servers, the tasks that should be solved when organizing an access control system for distributed information resources are formulated. The possibilities of the Z39.50 technologies as the most suitable for building such a system are considered. Within the framework of this technology, three access control models are discussed, which differ in the degree of integration of information server functions with the Z39.50 technologies.The creation and support of distributed information systems and electronic libraries that integrate heterogeneous information resources and operate in various software and hardware environments requires special approaches to managing these systems. If the resources or data themselves can be managed locally, even for distributed information systems, then the task of managing access to distributed resources cannot be solved within the framework of local administration. The justification of the last thesis can be seen when considering typical scenarios of the information server, which we will describe below","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Commun. Networks Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54039/ijcnis.v13i3.5122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Based on the analysis of typical scenarios of information servers, the tasks that should be solved when organizing an access control system for distributed information resources are formulated. The possibilities of the Z39.50 technologies as the most suitable for building such a system are considered. Within the framework of this technology, three access control models are discussed, which differ in the degree of integration of information server functions with the Z39.50 technologies.The creation and support of distributed information systems and electronic libraries that integrate heterogeneous information resources and operate in various software and hardware environments requires special approaches to managing these systems. If the resources or data themselves can be managed locally, even for distributed information systems, then the task of managing access to distributed resources cannot be solved within the framework of local administration. The justification of the last thesis can be seen when considering typical scenarios of the information server, which we will describe below
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于Z39.50协议的分布式信息系统模型
在分析信息服务器典型场景的基础上,提出了分布式信息资源访问控制系统组织需要解决的任务。考虑了Z39.50技术作为最适合构建这样一个系统的可能性。在该技术的框架内,讨论了三种访问控制模型,它们与Z39.50技术的集成程度不同。分布式信息系统和电子图书馆集成了异构信息资源,并在各种软件和硬件环境中运行,要创建和支持这些系统,需要特殊的方法来管理这些系统。如果资源或数据本身可以在本地管理,即使对于分布式信息系统也是如此,那么管理对分布式资源的访问的任务就不能在本地管理的框架内解决。在考虑信息服务器的典型场景时,可以看到最后一个论点的理由,我们将在下面描述
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Radar Based Activity Recognition using CNN-LSTM Network Architecture Alzheimer's And Parkinson's Disease Classification Using Deep Learning Based On MRI: A Review A Broadband Meta surface Based MIMO Antenna with High Gain and Isolation For 5G Millimeter Wave Applications An Optimized Deep Learning Based Optimization Algorithm for the Detection of Colon Cancer Using Deep Recurrent Neural Networks A DDoS Attack Detection using PCA Dimensionality Reduction and Support Vector Machine
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1