Abstract
The eduSource Communication Layer (ECL) defines a set of services, middleware, and communication conventions that enable repositories and tools to communicate with each other. ECL was designed and implemented within the scope of the recommendations in the IMS DRI specification. The ECL has been deployed worldwide and connects repositories in Canada, the United States, Australia, the United Kingdom, and Europe. In this chapter we describe the design of ECL, its architecture, and its middleware components. We also describe novel ECL security infrastructure (ECL-SI) for Web services that provide the security framework for object repositories based on a trust federation. The security solution defines security profiles, infrastructure services, and middleware component for a low-barrier adoption by existing repositories. Although this infrastructure can scale to large networks; it is particularly sensitive to the needs of medium-sized and small organizations, which have complex attributes and accessing policies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ACM. (1998) The ACM Computing Classification System 1998 version. http://www. acm.org/class/1998/.
Arms, W.Y., Hillmann, D., Lagoze, C., et al. (2002) A spectrum of interoperability: the site for science prototype for the NSDL. D-Lib Magazine, 8(1). http://dx.doi.ord/10.1045/jamlorg2002-arms.
Bhargavan, K., Fournet, C., Gordon, A.D. (2004) Verifying policy-based security for web services. CCS’ 04: Proceedings of the 11th ACM conference on Computer and Communications Security. Washington, DC, USA: ACM Press, pp. 268–277.
Box, D., Ehnebuske, D., Kakivaya, G., et al. (2000) Simple Object Access Protocol (SOAP) 1.1.
Carmody, S., Erdos, M., Hazelton, K., et al. (2005) InCommon Technical Requirements and Information.
Carmody, S., Erdos, M., Hazelton, K., (2005) Shibboleth-Architecture v09.
Dalziel, J.R., Vullings, E. (2005) MAMS and Middleware: the easily solved authentication, authorisation, identity, single sign-on, federation, trust, security, digital rights and automated access policy cluster of problems. Educause Australasia.
DDC Dewey Decimal Classification.
Della-Libera, G., Hallam-Baker, P., Hondo, M., et al. (2002) Web services security policy language (WS-SecurityPolicy).
Gamma, E., Helm, R., Johnson, R. and Vlissides, J. (1995) Design Patterns. Reading, MA: Addison-Wesley.
Gibbs, K., Goodman, B.D., Torres, E. (2003) Create Web services using Apache Axis and Castor. IBM Developer Works.
Gordon, A.D. and Pucella, R. (2002) Validating a Web service security abstraction by typing. XMLSEC’ 02: Proceedings of the 2002 ACM workshop on XML security. ACM Press, pp. 18–29.
Guttman, J.D., Herzog, A.L. (2005) Rigorous automated network security management, International Journal of Information Security, 4(1–2):29–48.
Hatala, M., Richards, G., Thorne, S., Merriman, J. (2004) Closing the interoperability gap: connecting open service interfaces with digital repository interoperability. Proceeding of the Ed-Media Conference, pp. 78–83.
Hatala, M., Richards, G. (2002) Global vs. community metadata standards: empowering users for knowledge exchange. In: Proceedings of the First International Semantic Web Conference on the Semantic Web. New York: Springer-Verlag, pp. 292–306.
IEEE. (2004) 1484.12.1: IEEE Standard for Learning Object Metadata, IEEE Learning Technologies Standards Commitee.
IMS. (2003) IMS Digital Repositories Interoperability—Core Functions Information Model.
Koper, R., Tattersall, C. (Eds.) (2005) Learning Design: A Handbook on Modelling and Delivering Networked Education and Training. New York: Springer-Verlag.
Lukell, S., Hutchison, A. (2003) Automated attack analysis and code generation in a multi-dimensional security protocol engineering framework. Proceedings of the Southern African Telecommunications Networks and Applications Conference.
McCarthy, J. (2003) Reap Benefits of Document Style Web Services. IBM Developer Works.
Morgan, R.L., Cantor, S., Carmody, S., Hoehn, W., Klingenstein, K. (2004) Federated security: the shibboleth approach. Educause Quaterly, 4:12–17.
Nadalin, A., Kaler, C., Hallam-Baker, P., Monzillo., R. (2004) OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004).
Nejdl, W., Wolf, B., Qu, C., et al. (2002) EDUTELLA: a P2P networking infrastructure based on RDF. Proceedings of the Eleventh International Conference on World Wide Web. ACM Press, pp. 604–615.
Pozza, D., Sisto, R., Durante, L. (2004) Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus. AINA’ 04: Proceedings of the 18th International Conference on Advanced Information Networking and Applications Volume 2IEEE Computer Society, pp. 400–405.
Richards, G., Hatala, M. (2004) POOL, POND and SPLASH: portals for online objects for learning. In: McGreal, R. (ed.) Online Education Using Learning Objects, London: Routledge Falmer.
Richards, G., Hatala, M. (2004) Semantic cobblestones: an interoperability mechanism for learning object repositories. In: McGreal, R. (ed.) Online Education Using Learning Objects. London: Routledge Falmer.
Scavo, T. (2005) Shibboleth Architecture: Technical Overview.
Simon, B., Miklos, Z., Nejdl, W., Sintek, M., Salvachua, J. (2003) Smart space for learning: a mediation infrastructure for learning services. Twelfth International Conference on World Wide Web.
Song, D., Perrig, A. Phan, D.E. (2001) AGVI—Automatic Generation, Verification, and Implementation of Security Protocols.
Tatsubori, M., Imamura, T., Nakamura, Y. (2004) Best-practice patterns and tool support for configuring secure Web services messaging. ICWS’ 04: Proceedings of the IEEE International Conference on Web Services (ICWS’04) IEEE Computer Society, pp. 244–251.
Tourzan, J., Koga, Y. (2004) Liberty ID-WSF Architecture Overview. Version 1.0, Liberty Alliance Project.
Van de Sompel, H., Lagoze, C. (2003) Notes from the Interoperability Front: A Progress Report on the Open Archives Initiative. ECDL 2002 LNCS 2458. New York: Springer, pp. 144–157.
Wiley, D. (2001) Instructional Use of Learning Objects.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag London Limited
About this chapter
Cite this chapter
Hatala, M., Richards, G., Eap, T., Shah, A. (2007). Secure Communication Layer for Scalable Networks of Learning Object Repositories. In: Pierre, S. (eds) E-Learning Networked Environments and Architectures. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-84628-758-9_10
Download citation
DOI: https://doi.org/10.1007/978-1-84628-758-9_10
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84628-351-2
Online ISBN: 978-1-84628-758-9
eBook Packages: Computer ScienceComputer Science (R0)