Access control in a privacy-aware eLearning environment

被引:6
|
作者
Franz, Elke [1 ]
Wahrig, Hagen [1 ]
Boettcher, Alexander [1 ]
Borcea-Pfitzmann, Katrin [1 ]
机构
[1] Tech Univ Dresden, Dept Comp Sci, D-8027 Dresden, Germany
关键词
D O I
10.1109/ARES.2006.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is necessary to prevent illegal accesses to shared resources. Within eLearning, access control is required in order to protect provided contents and services as well as user data. Usually, access rights are assigned to users of a system. However, in a system that applies Privacy-Enhancing Identity Management (PIM) common approaches cannot be directly utilized since users do not act under fix login names. Within this paper, we want to discuss how protection of contents as well as of user data can be realized in such an environment. The context of our work is the eLearning application BluES'n(1) which additionally aims at providing users a flexible working environment. All functionality needed for realizing access control is provided by a PIM-aware platform which is currently developed within the European project PRIME2.
引用
收藏
页码:879 / +
页数:2
相关论文
共 50 条
  • [1] Towards privacy-aware eLearning
    Borcea, Katrin
    Donker, Hilko
    Franz, Elke
    Pfitzmann, Andreas
    Wahrig, Hagen
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2006, 3856 : 167 - 178
  • [2] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [3] Privacy-aware Role Based Access Control
    Ni, Qun
    Trombetta, Alberto
    Bertino, Elisa
    Lobo, Jorge
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 41 - 50
  • [4] A Semantic Framework for Privacy-Aware Access Control
    Lioudakis, Georgios V.
    Dellas, Nikolaos L.
    Koutsoloukas, Eleftherios A.
    Kapitsaki, Georgia M.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    [J]. 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 757 - 764
  • [5] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [6] Conditional privacy-aware role based access control
    Ni, Qun
    Lin, Dan
    Bertino, Elisa
    Lobo, Jorge
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 72 - +
  • [7] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [8] The architecture of a privacy-aware access control decision component
    Ardagna, Claudio A.
    Cremonini, Marco
    Damiani, Ernesto
    De Capitani di Vimercati, Sabrina
    Samarati, Pierangela
    [J]. CONSTRUCTION AND ANALYSIS OF SAFE, SECURE, AND INTEROPERABLE SMART DEVICES, 2006, 3956 : 1 - 15
  • [9] Scalable Access Control For Privacy-Aware Media Sharing
    Ma, Changsha
    Yan, Zhisheng
    Chen, Chang Wen
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 21 (01) : 173 - 183
  • [10] Privacy-aware access control with trust management in web service
    Li, Min
    Sun, Xiaoxun
    Wang, Hua
    Zhang, Yanchun
    Zhang, Ji
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2011, 14 (04): : 407 - 430