Access control and authorization for protecting disseminative information in E-learning workflow

被引:2
|
作者
Sun, Lili [1 ]
Wang, Hua [1 ]
机构
[1] Univ So Queensland, Dept Maths & Comp, Toowoomba, Qld 4350, Australia
来源
关键词
workflow; access control; E-learning; SCHEME;
D O I
10.1002/cpe.1748
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
E-learning defined as learning activities performed over electronic devices is rapidly increasing and has become one of the key e-commerce applications with a growing commercial market in the near future. Access control and authorization in E-learning workflow is a vital problem with low costs and no location limits for students. E-learning organizers prefer to disseminate their message as widely as possible, while at the same time authorized people only are able to access disseminative information. However, in the E-learning workflow it is a challenge to protect from access, such as reading and updating, the digital message that has been disseminated out from the organizations. This paper aims to substantially provide a foundation for developing appropriate security solutions for organizations' secure dissemination of digital information. An application-level secure architecture is developed based on the references on both server side and client side. The architecture provides control and tracking capabilities for dissemination and usage of digital information while others provide only tracking capability. The outcomes of this paper can immediately apply to prevent unauthorized dissemination of digital content amongst agents of universities regardless of their intention or possession of the digital information and will contribute to higher security in E-learning. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:2034 / 2042
页数:9
相关论文
共 50 条
  • [31] Security applications of optical face recognition system: Access control in e-learning
    Inaba, R
    Watanabe, E
    Kodate, K
    OPTICAL REVIEW, 2003, 10 (04) : 255 - 261
  • [32] Face-based Access Control and Invigilation Tool for e-Learning Systems
    Irfan, C. M. Althaff
    Nomura, Syusaku
    Ouzzane, Karim
    Fukumura, Yoshimi
    ICBAKE: 2009 INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING, 2009, : 40 - +
  • [33] Security Applications of Optical Face Recognition System: Access Control in E-Learning
    Rieko Inaba
    Eriko Watanabe
    Kashiko Kodate
    Optical Review, 2003, 10 : 255 - 261
  • [34] A uniform model for authorization and access control in enterprise information platform
    Li, DD
    Hu, SL
    Bai, S
    ENGINEERING AND DEPLOYMENT OF COOPERATIVE INFORMATION SYSTEMS, PROCEEDINGS, 2002, 2480 : 180 - 192
  • [35] Taxonomy and Unified Access of E-Learning Platforms
    Aissaoui, Karima
    Azizi, Mostafa
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 625 - 629
  • [36] Workflow approach to design automatic tutor in e-learning environment
    Boumiza, Salma
    Souilem, Dalila
    Bekiarski, Alexander
    2016 INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2016, : 263 - 268
  • [37] Stochastic Approach to Investigate Protected Access to Information Resources in Combined E-Learning Environment
    Romansky, Radi
    MATHEMATICS, 2022, 10 (16)
  • [38] E-learning and equal access to quality education
    Snejana, Dineva
    Veselina, Nedava
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON VIRTUAL LEARNING, ICVL 2018, 2018, : 528 - 533
  • [39] E-learning Protection of Open Access Platforms
    Derawi, Mohammad
    2014 INTERNATIONAL CONFERENCE ON WEB AND OPEN ACCESS TO LEARNING (ICWOAL), 2014,
  • [40] Embedded enterprise e-learning mode based on workflow driving
    College of Information Science and Technology, Beijing Normal University, Beijing 100875, China
    不详
    J. Comput. Inf. Syst., 2006, 1 (329-335):