Access control and authorization for protecting disseminative information in E-learning workflow

被引:2
|
作者
Sun, Lili [1 ]
Wang, Hua [1 ]
机构
[1] Univ So Queensland, Dept Maths & Comp, Toowoomba, Qld 4350, Australia
来源
关键词
workflow; access control; E-learning; SCHEME;
D O I
10.1002/cpe.1748
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
E-learning defined as learning activities performed over electronic devices is rapidly increasing and has become one of the key e-commerce applications with a growing commercial market in the near future. Access control and authorization in E-learning workflow is a vital problem with low costs and no location limits for students. E-learning organizers prefer to disseminate their message as widely as possible, while at the same time authorized people only are able to access disseminative information. However, in the E-learning workflow it is a challenge to protect from access, such as reading and updating, the digital message that has been disseminated out from the organizations. This paper aims to substantially provide a foundation for developing appropriate security solutions for organizations' secure dissemination of digital information. An application-level secure architecture is developed based on the references on both server side and client side. The architecture provides control and tracking capabilities for dissemination and usage of digital information while others provide only tracking capability. The outcomes of this paper can immediately apply to prevent unauthorized dissemination of digital content amongst agents of universities regardless of their intention or possession of the digital information and will contribute to higher security in E-learning. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:2034 / 2042
页数:9
相关论文
共 50 条
  • [41] A coordinator for workflow management systems with information access control
    Chou, SC
    Wu, CJ
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (12): : 2786 - 2792
  • [42] E-LEARNING AND DISTANCE LEARNING INFORMATION SYSTEMS AUDITING
    Andronie, Maria
    QUALITY AND EFFICIENCY IN E-LEARNING, VOL 1, 2013, : 459 - 464
  • [43] Organizational learning, tacit information, and e-learning: a review
    Falconer, Liz
    LEARNING ORGANIZATION, 2006, 13 (02): : 140 - +
  • [45] An Access Control Architecture for Protecting Health Information Systems
    Esposito, Angelo
    Sicuranza, Mario
    Ciampi, Mario
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 35 - 47
  • [46] A unified access control infrastructure using attributes and ontology in e-learning resource grids
    Huang, Changqin
    Wu, Yonghe
    Wu, Zhanjie
    Zhu, Zhiting
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1481 - 1486
  • [47] INFORMATION SECURITY ASPECTS OF E-LEARNING SYSTEMS
    Paulins, Nauris
    AICT2010 - APPLIED INFORMATION AND COMMUNICATION TECHNOLOGIES, PROCEEDINGS OF THE 4TH INTERNATIONAL SCIENTIFIC CONFERENCE, 2010, : 142 - 147
  • [48] E-learning and the status of knowledge in the information age
    Polsani, PR
    INTERNATIONAL CONFERENCE ON COMPUTERS IN EDUCATION, VOLS I AND II, PROCEEDINGS, 2002, : 952 - 956
  • [49] E-learning and teaching in library and information services
    Brewer, G
    PROGRAM-ELECTRONIC LIBRARY AND INFORMATION SYSTEMS, 2003, 37 (02) : 136 - 137
  • [50] E-learning and teaching in library and information services
    Blakesley, E
    JOURNAL OF ACADEMIC LIBRARIANSHIP, 2004, 30 (02): : 162 - 163