Technologies for repository interoperation and access control

Sh Browne, J. Dongarra, J. Horner, P. McMahan, S. Wells

Research output: Contribution to conferencePaperpeer-review

2 Scopus citations

Abstract

Over the past several years, network-accessible repositories have been developed by various academic, government, and industrial organizations to provide access to software and related resources. Allowing distributed maintenance of these repositories while enabling users to access resources from multiple repositories via a single interface has brought about the need for interoperation. Concerns about intellectual property rights and export regulations have brought about the need for access control. This paper describes technologies for interoperation and access control that have been developed as part of the National High-performance Software Exchange (NHSE) project, as well as their deployment in a freely available repository maintainer's toolkit called Repository in a Box. The approach to interoperation has been to participate in the development of and to implement an IEEE standard data model for software catalog records. The approach to access control has been to extend the data model in the area of intellectual property rights and to implement access control mechanisms of varying strengths, ranging from email address verification to X.509 certificates, that enforce software distribution policies specified via the data model. Although they have been developed within the context of software repositories, these technologies should be applicable to distributed digital libraries in general.

Original languageEnglish
Pages40-48
Number of pages9
DOIs
StatePublished - 1998
Externally publishedYes
EventProceedings of the 1998 3rd ACM Conference on Digital Libraries - Pittsburgh, PA, USA
Duration: Jun 23 1998Jun 26 1998

Conference

ConferenceProceedings of the 1998 3rd ACM Conference on Digital Libraries
CityPittsburgh, PA, USA
Period06/23/9806/26/98

Fingerprint

Dive into the research topics of 'Technologies for repository interoperation and access control'. Together they form a unique fingerprint.

Cite this