Robert Tansley ha scritto:
> On 01/09/07, Mark Diggory <[EMAIL PROTECTED]> wrote:
>   
>> Restricting access to Communites, Collection or Items directly is
>> certainly not what DSpace was designed to do.
>>     
>
> The real issue is more that the DSpace authz model has no notion of
> 'know of an object's existence' as an action.  One of the 'finish 1.0
> in a finite amount of time' tradeoffs was not to implement this (for
> precisely the reasons that Andrea mentioned -- the complexity and
> expense of evaluating visibility in operations like search, browse and
> harvest.)
>   
Hi Rob,
I'm not sure that splitting the current READ permission in a more
granular way could be the rigth solution...
Could we have an EXISTENCE permission on an object without READ
permission? Could we have a READ permission on an object without EXISTENCE?
I think that the answer is NO for both the questions.
IMHO the current permissions are sufficient enough. There is only one
problem about bitstreams READ definition. In fact, while for
communities, collections, item and bundle READ means the possibility of
metadata access (therefore knowing about the object existence), the READ
permission for bitstream allows both medatata (name, size, format, etc.)
and content access (InputStream).
Therefore I think that it would be good to make this behaviour uniform
also hooking-up the READ permission to the InputStream, and this would
also make sense for WRITE permission.

> >From a design standpoint, I think authz needs an overhaul as I've
> mentioned many times before; I think introducing the notion of 'know
> of an objects existence' distinct from the existing READ is the right
> way to go about this rather than overloading READ.
>
> It makes sense to me to have queries evaluated using a particular
> Context
could we use different indexes? Every EPerson could have a set of lucene
indexes, which would contain only the objects that he can see...
In this scenario we need to keep 1 index for any group or eperson that
have READ policies

Andrea
>  (be they search etc) only return objects that the
> currently-authenticated e-person can 'see'.  The system has not
> evolved in a way amenable to this, however.  Post-query filtering
> doesn't work because if you ask for 'the first 10 items with titles
> starting with C', you may end up with only 6 visible results.  For a
> more general solution, either every indexing system needs to be
> ACL-aware (yuck), or we should create a unified query API whose
> implementation is ACL-aware, i.e. indexes relevant permissions.
> Lucene seems the most likely candidate for such an API.  Unfortunately
> things seem to be diversifying rather than unifying in this area.
>
> Rob
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems?  Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >>  http://get.splunk.com/
> _______________________________________________
> Dspace-devel mailing list
> [EMAIL PROTECTED]
> https://lists.sourceforge.net/lists/listinfo/dspace-devel
>
>
>   


-- 
Dott. Andrea Bollini
Responsabile tecnico sviluppo e formazione applicativi JAVA
Sezione Servizi per le Biblioteche e l'Editoria Elettronica
CILEA, http://www.cilea.it
tel. +39 06-59292831  cel. +39 348-8277525


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
DSpace-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dspace-tech

Reply via email to