Access control in a privacy-aware eLearning environment

被引:6
|
作者
Franz, Elke [1 ]
Wahrig, Hagen [1 ]
Boettcher, Alexander [1 ]
Borcea-Pfitzmann, Katrin [1 ]
机构
[1] Tech Univ Dresden, Dept Comp Sci, D-8027 Dresden, Germany
关键词
D O I
10.1109/ARES.2006.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is necessary to prevent illegal accesses to shared resources. Within eLearning, access control is required in order to protect provided contents and services as well as user data. Usually, access rights are assigned to users of a system. However, in a system that applies Privacy-Enhancing Identity Management (PIM) common approaches cannot be directly utilized since users do not act under fix login names. Within this paper, we want to discuss how protection of contents as well as of user data can be realized in such an environment. The context of our work is the eLearning application BluES'n(1) which additionally aims at providing users a flexible working environment. All functionality needed for realizing access control is provided by a PIM-aware platform which is currently developed within the European project PRIME2.
引用
收藏
页码:879 / +
页数:2
相关论文
共 50 条
  • [31] Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things
    Zhang, Yinghui
    Deng, Robert H.
    Han, Gang
    Zheng, Dong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 123 : 89 - 100
  • [32] Privacy-Aware Wrappers
    Jafer, Yasser
    Matwin, Stan
    Sokolova, Marina
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE (AI 2015), 2015, 9091 : 130 - 138
  • [33] Privacy-Aware Folksonomies
    Heidinger, Clemens
    Buchmann, Erik
    Huber, Matthias
    Boehm, Klemens
    Mueller-Quade, Joern
    [J]. RESEARCH AND ADVANCED TECHNOLOGY FOR DIGITAL LIBRARIES, 2010, 6273 : 156 - 167
  • [34] THE PRIVACY-AWARE ACCESS CONTROL SYSTEM USING ATTRIBUTE-AND ROLE-BASED ACCESS CONTROL IN PRIVATE CLOUD
    Mon, Ei Ei
    Naing, Thinn Thu
    [J]. 2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 447 - 451
  • [35] An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services
    Xiong, Ling
    Li, Fagen
    He, Mingxing
    Liu, Zhicai
    Peng, Tu
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2309 - 2323
  • [36] Privacy-Aware Scheduling Heuristic Based on Priority in Edge Environment
    Hong, Yue
    Wang, Caie
    Zheng, Wei
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT IV, 2024, 14490 : 277 - 294
  • [37] Packet:a privacy-aware access control policy composition method for services composition in cloud environments
    Li LIN
    Jian HU
    Jianbiao ZHANG
    [J]. Frontiers of Computer Science., 2016, 10 (06) - 1157
  • [38] Application of Privacy-aware Role-based Access Control Model in IHE-XDS
    Dauletbek, Daniya
    Yuan, Shi-Zhong
    [J]. 4TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2017), 2017, 12
  • [39] Privacy-Aware Access Control in IoT-Enabled Healthcare: A Federated Deep Learning Approach
    Lin, Hui
    Kaur, Kuljeet
    Wang, Xiaoding
    Kaddoum, Georges
    Hu, Jia
    Hassan, Mohammad Mehedi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04): : 2893 - 2902
  • [40] Packet: a privacy-aware access control policy composition method for services composition in cloud environments
    Li Lin
    Jian Hu
    Jianbiao Zhang
    [J]. Frontiers of Computer Science, 2016, 10 : 1142 - 1157