Abstract
Security considerations play an increasingly important role for distributed computing. In today’s Internet age, academia requires sharing, distributing, merging, changing information, linking applications and other resources within and among universities and other related organizations. Because e-learning systems are open, distributed and interconnected, then security becomes an important challenge in order to insure that interested actors only have access to the right information at the appropriate time. The purpose of this paper is to give an in-depth understanding of most important security challenges that can be relevant for distributed e-learning systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The orange book. Department of defense (dod) trusted computer system evaluation criteria (tcsec), DoD 5200.28-STD (1985) GPO: 008-000-00461-7
Rebol. relative expression-based object language (1998), web site: http://www.rebol.com/
Anido, L., Fernandez, M., Caeiro, M., Santos, J., Rodriguez, J., Llamas, M.: Educational metadata and brokerage. Computers and Education 38(4), 351–374 (2002)
Benjamin, R., Gladman, B., Randell, B.: Protecting it systems from cyber crime. The Computer Journal 41(7), 429–443 (1998)
Demurjian, P.S.A.: Security, authorization and authentication for entreprise computing. CSE Technical Report TR-03-99, Dept. of Computer Science and Engineering, University of Connecticut (1999)
Gómez, R.: Distributed systems and computer security. In: Proc. of the 4th. International Conference On Principles of DIstributed Systems, OPODIS 2000, pp. 20–22 (December 2000)
Hassler, V.: Security Fundamentals for E-Commerce. Computer Security Series. Artech House (2001)
Mata, E., Bui, M.: Interoperability among distributed e-learning systems. In: Proc. of the 4th. International Conference on Information Technology Based Higher Education and Training, ITHET 2003, pp. 191–194 (July 2003)
Rosenberg, M.: e-Learning: Strategies for Delivering Knowledge in the Digital Age. Mc.Graw Hill, New York (2001)
Syverson, P.: A taxonomy of reply attacks. In: Proc. of the Computer Security Foundations Workshop VII, IEEE CS Press, Los Alamitos (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gómez Cárdenas, R., Sánchez, E.M. (2005). Security Challenges of Distributed e-Learning Systems. In: Ramos, F.F., Larios Rosillo, V., Unger, H. (eds) Advanced Distributed Systems. ISSADS 2005. Lecture Notes in Computer Science, vol 3563. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11533962_49
Download citation
DOI: https://doi.org/10.1007/11533962_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28063-7
Online ISBN: 978-3-540-31674-9
eBook Packages: Computer ScienceComputer Science (R0)