The investigation of characteristics of access and use of resources in different distributed environments in the network space is aimed at determining optimal levels for the basic parameters of the supported processes. On the other hand, with the development of the possibilities of the digital space and the significant change in the level of informatization of the society, it is necessary to take the necessary measures to ensure secure access to information resources and in particular to the profiles of personal data. In this respect, the purpose of the article is to propose an organization of heterogeneous environment with resources stored in different places (own memories and cloud data centres). A general architecture and functionality of the main sub-systems are presented. Deterministic model investigation by using Petri Net apparatus based on preliminary formalization is provided to analyse the effectiveness of the processes for regulated and secure access to resources.
Contemporary digital age proposes different opportunities in the public, social, private, and business areas based on remote access to distributed resources placed in virtual, cloud, educational, governmental, business, smart, and so forth environments. In this reason, the e‐governance is realized on the basis of digital communications between different parties that requires strong protection of the information resources and personal data. The digital sustainability is an important task for e‐governance in the digital world. Article deals with principles of correct protection of the information resources (including in the cloud) by using strong procedures for access regulation of the external clients. Organization of Information Security Management System for identification, registration, authentication, and authorization of the requests is discussed. An investigation of the proposed functionality is made on the basis of stochastic analytical modelling by using the apparatus of Markov chains and statistical processing and interpretation of the obtained results.
The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied. Strong security procedures should be proposed to protect user's profiles, designed after successful registration and all personal information collected by educational processes. The goal of this article is to present an idea to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud services and social computing. These technologies can endanger data security since they make possible remote access to resources, sharing information between participants by network communications. In order to avoid data vulnerabilities users must be identified and authenticated before, i.e. to be allowed to access information resources otherwise integrity and confidentiality of e-learning system could be destroyed. In order to propose solution basic principles of information security and privacy protection in e-learning processes are discussed in this article. As a result, an organizational scheme of a system for information security and privacy is proposed. Based on these principles a graph formalization of access to the system resources is made and architecture for combined (heterogenic) e-learning architecture with secure access to the resources is designed. Analytical investigation based on designed Markov chain has been carried out and several statistical assessments delivered by Develve software are discussed.
Globalization in the contemporary information society outlines new important challenges in privacy and personal data protection that apply to user security in cyberspace. This is also the case e-learning environments, which use new network technologies, such as remote access, distributed processing, information sharing, cloud services, social computing, etc. Strong security procedures based on authentication, authorization, and data protection should be proposed to protect system resources, user profiles, personal information, educational materials, and other specific information. The chapter presents the opportunities and challenges of some digital technologies that could increase the effectiveness of e-learning processes by developing a combined e-learning environment. A functional architecture with two sub-systems (front office and back office) and different information resources (public, internal, external) is discussed. Investigation by using formalization and modelling is made and assessments are presented.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.