Education and Information Technologies

, Volume 21, Issue 3, pp 521–530 | Cite as

Politic of security, privacy and transparency in human learning systems

  • Adil Jeghal
  • Lahcen Oughdir
  • Hamid Tairi


The preservation of confidentiality has become a major issue for the majority of applications that process personal information, the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. A great deal of research has already been conducted in educational environments. However, one aspect that has not received much attention is the important role of Information Security, especially in newer education environments such as the e-learning environment. In this article we seek to propose a policy of security in such a way to affect views of profiles for each user to control the information accessed by this user.


Security in e-learning Privacy in e-learning Human learning systems Profile of learners XML Access Control Access Model 


  1. Alotaiby, F. T., & Chen, J. X. (2004). A model for team-based access control (TMAC 2004). In Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on (Vol. 1, pp. 450–454). IEEE.Google Scholar
  2. Bell, D. E., & La Padula, L. J. (1976). Secure computer system: Unified exposition and multics interpretation (No. MTR-2997-REV-1). MITRE CORP BEDFORD MA.Google Scholar
  3. Biba, K. J. (1975). Integrity consideration for secure computer systems. Technical raport MTR-3153, The MITRE corpooration.Google Scholar
  4. El-Khatib, K., Korba, L., Xu, Y., & Yee, G. (2003). Privacy and security in e-learning. International Journal of Distance Education Technologies (IJDET),1(4), 1–19.Google Scholar
  5. Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3), 224–274.CrossRefGoogle Scholar
  6. Gavrila, S. I., & Barkley, J. F. (1998). Formal specification for role based access control user/role and role/role relationship management. In Proceedings of the third ACM workshop on Role-based access control (pp. 81–90). ACM.Google Scholar
  7. Jeghal, A., Oughdir, L., Tairi, H., & El Affar, A. (2013). A model of the reuse of the profiles of learners. Journal of Theoretical & Applied Information Technology, 57(2), 288–293.Google Scholar
  8. Jerman-Blažič, B., & Klobučar, T. (2005). Privacy provision in e-learning standardized systems: status and improvements. Computer Standards & Interfaces, 27(6), 561–578.CrossRefGoogle Scholar
  9. Joshi, J. B., Aref, W. G., Ghafoor, A., & Spafford, E. H. (2001). Security models for web-based applications. Communications of the ACM, 44(2), 38–44.CrossRefGoogle Scholar
  10. Lampson, B. W. (1974). Protection. ACM SIGOPS Operating Systems Review, 8(1), 18–24.CrossRefMATHGoogle Scholar
  11. Sandhu, R. S., & Samarati, P. (1994). Access control: principle and practice. Communications Magazine, IEEE, 32(9), 40–48.CrossRefGoogle Scholar
  12. Weippl, E. R. (2005). Security in E-learning. eLearn Magazine, 2005(3), 3.Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.LIIAN, Department of Informatics Faculty of Science Dhar-MahrazUniversity of Sidi Mohamed Ben AbdellahAtlas-FezMorocco
  2. 2.LIMAO, Department of Mathematics, Physics and Informatics Polydisciplinary Faculty -TazaUniversity of Sidi Mohamed Ben AbdellahTazaMorocco

Personalised recommendations