[ 
https://jira.duraspace.org/browse/DS-824?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=19127#action_19127
 ] 

Brian Freels-Stendel commented on DS-824:
-----------------------------------------

Hi Andrea.

I think it would be possible (and perhaps desirable) to work as closely to the 
regular functioning of the system as possible.  That might mean putting a line 
in the resourcepolicy table.  I'm a little worried, though, about what that 
means for the group (or individual, although I think eperson policies aren't 
supported yet) that would be specified.  I think it would require a real group.

My initial thoughts were since this will require a new table anyway (unless 
only people with accounts could request access to items, storage of 
names/e-mails would be necessary), I was thinking it could hold dates to 
specify start/end of access privs.  (So far, I've come up with these columns 
for that table: name, e-mail, requestor_notes, author_notes, date_initiated, 
date_answered, date_end_access, request_denied, request_key.)  That would take 
care of where to store the relevant dates.  Ideally, we'd want to allow admins 
access to the information, and keeping it in a separate table would be the 
easiest way to access it.  On the other hand, it would be next to impossible to 
include it in other stuff, such as the policy tool.

After that, though, I was thinking that the process in the IP authentication 
with special groups might be a model to extend.  It goes so far as to 'ghost' 
users into a group (an instantiated group, granted.)  That sort of thing might 
be able to be extended into the ghosting of a non-existent group, which could 
be fed into the regular authorization system.  (It would be possible to use the 
resourcepolicy table as well, inserting the ghost group into the information 
returned; but it seems like it might be difficult to specify the criteria to 
extract the particular rule.)  I'm worried, though, that this might be a trick 
that isn't acceptable.  Is it an end-run around security that could be used 
nefariously?  Or can it be implemented securely, so there's no need to worry 
about it?

As you can see, I'm still struggling with philosophical issues as much as 
programmatic ones, so I appreciate all the input I can get.

> Request Copy function for XMLUI; would allow author of item to give viewing 
> privs to restricted item
> ----------------------------------------------------------------------------------------------------
>
>                 Key: DS-824
>                 URL: https://jira.duraspace.org/browse/DS-824
>             Project: DSpace
>          Issue Type: New Feature
>          Components: Documentation, Language Packs, XMLUI
>            Reporter: Brian Freels-Stendel
>            Priority: Trivial
>
> The University of Minho developed a patch that gives this functionality in 
> JSPUI:  https://wiki.duraspace.org/display/DSPACE/RequestCopy .  
> In implementing it for the XMLUI, I would like to alter the functionality so 
> that the process looks something like:
>  a.  User clicks on restricted item link
>  b.  System responds with current behavior, adding a link/button to request 
> privs to view item
>  c.  Clicking link to request privs to view item sends e-mail to author of 
> item: includes Yes or No options
>  d.  Clicking yes sends e-mail to User with link to view item
>  e.  Clicking on link creates 'ghost' group with read access to item, 
> including associated bitstreams.  (Probably time-limited; one month?)
> This process would improve on the original process of sending the bitstreams 
> to the User via e-mail; large documents often exceed outgoing mail limits, or 
> incoming mailbox size restrictions.  However, it also presents possible 
> problems in trying to bypass the authorization system.
> I'm just starting to trace paths into the guts of XMLUI, so the general 
> process is still in flux.  I'd welcome any input, particularly regarding how 
> to temporarily grant viewing privs to the restricted bitstreams.  

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: 
https://jira.duraspace.org/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

------------------------------------------------------------------------------
Free Software Download: Index, Search & Analyze Logs and other IT data in 
Real-Time with Splunk. Collect, index and harness all the fast moving IT data 
generated by your applications, servers and devices whether physical, virtual
or in the cloud. Deliver compliance at lower cost and gain new business 
insights. http://p.sf.net/sfu/splunk-dev2dev 
_______________________________________________
Dspace-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dspace-devel

Reply via email to