Skip to main content

Secure and Efficient Information Sharing in Multi-university E-Learning Environments

  • Conference paper
Advances in Web Based Learning – ICWL 2007 (ICWL 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4823))

Included in the following conference series:

Abstract

Digital information sharing of multi-university environments usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure manner poses a difficult and vital challenge. This paper aims to build a new rule-based framework to identify and address issues of sharing in multi-university environments through role-based access control management (RBAC). The framework includes a role-based group delegation granting model, group delegation revocation model, authorization granting and authorization revocation. Finally, the current proposal is compared with other related work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15(4), 706–734 (1993)

    Article  Google Scholar 

  2. Barka, E., Sandhu, R.: Framework for role-based delegation models and some extensions. In: Proceedings of the 16 Annual Computer Security Applications Conference, New Orleans, pp. 168–177 (2000)

    Google Scholar 

  3. Edgar, R.W.: Security in E-Learning, vol. 16. Springer, Heidelberg (2005)

    Google Scholar 

  4. El-Khatib, K., Korba, L., Xu, Y., Yee, G.: Privacy and security in e-learning. International Journal of Distance Education Technologies 1(4), 11–30 (2003)

    Google Scholar 

  5. Feinstein, H.L.: Final report: Nist small business innovative research (sbir) grant: role based access control: phase 1. technical report. In: SETA Corp. (1995)

    Google Scholar 

  6. Ferraiolo, D., Cugini, J., Kuhn, R.: Role-based access control (rbac): Features and motivations. In: The 11th Annual Computer Security Applications Conference, New Orleans, LA, pp. 241–248 (1995)

    Google Scholar 

  7. Ferraiolo, D.F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference, pp. 554–563 (1992)

    Google Scholar 

  8. Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: Role-based access control model and reference implementation within a corporate intranet. In: TISSEC, vol. 2, pp. 34–64 (1999)

    Google Scholar 

  9. Frolik, J., Weller, T.M.: Wireless sensor systems: an approach for a multiuniversity design course. IEEE Transactions on Education 45(2), 135–141 (2002)

    Article  Google Scholar 

  10. Hagstrom, A., Jajodia, S., Presicce, F., Wijesekera, D.: Revocations-a classification. In: Proceedings of 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, pp. 44–58 (2001)

    Google Scholar 

  11. Jajodia, S., Samarati, P., Subrahmanian, V., Bertino, E.: A unified framework for enforcing multiple access control policies. In: Proceedings of the 1997 ACM SIGMOD international conference on Management of data, pp. 474–485. ACM Press, New York (1997)

    Chapter  Google Scholar 

  12. Li, Q., Atluri, V.: Concept-level access control for the semantic web. In: Proceedings of the 2003 ACM workshop on XML security, pp. 94–103. ACM Press, New York (2003)

    Google Scholar 

  13. Lowe, H., Wallis, A.M., Newman, J.: Role-based access control for vicarious learning. In: Proc. European Conference on E-Learning, pp. 43–50. Brunel University, Uxbridge (2002)

    Google Scholar 

  14. Lu, H.: Open multi-agent systems for collaborative web-based learning. International Journal of Distance Education Technologies 2(2), 36–45 (2004)

    Google Scholar 

  15. Mendling, J., Neumann, G., Pinterits, A., Simon, B., Wild, F.: Indirect revenue models for e-learning at universities - the case of learn@wu. In: E-Learning Workshop Hannover - Einsatzkonzepte und Geschftsmodelle, Hannover, Germany (2004)

    Google Scholar 

  16. Michael, H.: XSLT Programmer’s Reference. Wiley, Chichester (2001)

    Google Scholar 

  17. Neely, S., Lowe, H., Eyers, D., Bacon, J., Newman, J., Gong, X.: An architecture for supporting vicarious learning in a distributed environment. In: SAC 2004, pp. 963–970. ACM Press, New York (2004)

    Chapter  Google Scholar 

  18. Seufert, S.: E-learning business models: Framework and best practice examples. Idea Group, pp. 11–36 (2001)

    Google Scholar 

  19. Wang, H., Cao, J., Zhang, Y.: A consumer anonymity scalable payment scheme with role based access control. In: 2nd International Conference on Web Information Systems Engineering (WISE 2001), Kyoto, Japan, pp. 53–62 (2001)

    Google Scholar 

  20. Wang, H., Cao, J., Zhang, Y.: Formal authorization allocation approaches for role-based access control based on relational algebra operations. In: 3nd International Conference on Web Information Systems Engineering (WISE 2002), Singapore, pp. 301–312 (2002)

    Google Scholar 

  21. Wang, H., Cao, J., Zhang, Y.: Formal authorization allocation approaches for permission-role assignments using relational algebra operations. In: Proceedings of the 14th Australian Database Conference ADC 2003, Adelaide, Australia, pp. 125–133 (2003)

    Google Scholar 

  22. Wang, H., Cao, J., Zhang, Y.: An Electronic Payment Scheme and Its RBAC management. Concurrent Engineering: Research and Application 12(3), 247–275 (2004)

    Article  Google Scholar 

  23. Wang, H., Sun, L., Zhang, Y., Cao, J.: Authorization Algorithms for the Mobility of User-Role Relationship. In: Proceedings of the 28th Australasian Computer Science Conference (ACSC 2005), Newcastle, Australia, pp. 167–176 (2005)

    Google Scholar 

  24. Wang, H., Zhang, Y., Cao, J., Varadharajan, V.: Achieving secure and flexible m-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special issue on M-Services, 697–708 (2003)

    Google Scholar 

  25. Zhang, L., Ahn, G., Chu, B.: A rule-based framework for role-based delegation. In: Proceedings of ACM Symposium on Access Control Models and Technologies, Chantilly, VA, pp. 153–162 (2001)

    Google Scholar 

  26. Zhang, L., Ahn, G., Chu, B.: A role-based delegation framework for healthcare information systems. In: Proceedings of ACM Symposium on Access Control Models and Technologies, Monterey, CA, pp. 125–134 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Howard Leung Frederick Li Rynson Lau Qing Li

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Li, Q. (2008). Secure and Efficient Information Sharing in Multi-university E-Learning Environments. In: Leung, H., Li, F., Lau, R., Li, Q. (eds) Advances in Web Based Learning – ICWL 2007. ICWL 2007. Lecture Notes in Computer Science, vol 4823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78139-4_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78139-4_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78138-7

  • Online ISBN: 978-3-540-78139-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics