Trust-based access control in virtual learning community

被引:0
|
作者
Wang, Shujuan [1 ]
Liu, Qingtang [1 ,2 ]
机构
[1] Huazhong Normal Univ, Dept Informat Technol, Wuhan, Hubei, Peoples R China
[2] Huazhong Normal Univ, Engn Res Ctr, Educ Informat, Wuhan, Hubei, Peoples R China
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.
引用
收藏
页码:514 / +
页数:2
相关论文
共 50 条
  • [1] A trust-based access control model for virtual organizations
    Lin, Aizhong
    Vullings, Erik
    Dalziel, James
    [J]. GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 557 - +
  • [2] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514
  • [3] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [4] Validating a trust-based access control system
    Adams, William J.
    Davis, Nathaniel J.
    [J]. TRUST MANAGEMENT, 2007, 238 : 91 - +
  • [5] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 555 - 560
  • [6] Trust-Based Access Control for Collaborative System
    Liu, Yichun
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 444 - 448
  • [7] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 383 - 385
  • [8] Trust-based access control for collaborative systems
    Bedi, Punam
    Kaur, Harmeet
    Gupta, Bhavna
    [J]. JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2014, 26 (01) : 109 - 126
  • [9] Trust-Based Peer Assessment for Virtual Learning Systems
    Tosic, Milorad
    Nejkovic, Valentina
    [J]. SOCIAL INFORMATICS, 2010, 6430 : 176 - 191
  • [10] Risk models for trust-based access control (TBAC)
    Dimmock, N
    Bacon, J
    Ingram, D
    Moody, K
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2005, 3477 : 364 - 371