2008
DOI: 10.1109/tlt.2008.11
|View full text |Cite
|
Sign up to set email alerts
|

Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Both Damiani et al [21] and Weitzner et al [101] focus on the access control mechanisms that are required to support new ac-cess control paradigms where user privacy is a key requirement. De Coi et al [22] and Bonatti and Olmedilla [10] investigate the interplay between trust, access control and policy languages. While, Ryutov et al [73] focus more on the data model, investigating access control requirements from a graph perspective, as opposed to the traditional hierarchical approach.…”
Section: Access Control Requirements For Linked Datamentioning
confidence: 99%
See 3 more Smart Citations
“…Both Damiani et al [21] and Weitzner et al [101] focus on the access control mechanisms that are required to support new ac-cess control paradigms where user privacy is a key requirement. De Coi et al [22] and Bonatti and Olmedilla [10] investigate the interplay between trust, access control and policy languages. While, Ryutov et al [73] focus more on the data model, investigating access control requirements from a graph perspective, as opposed to the traditional hierarchical approach.…”
Section: Access Control Requirements For Linked Datamentioning
confidence: 99%
“…Underlying Formalism [22,3,10]. Access control languages should be based on formal semantics, as it decouples the meaning of the policies from the actual implementation.…”
Section: Specificationmentioning
confidence: 99%
See 2 more Smart Citations
“…However, in this domain, ontologies are even more advantageous if they are used in combination with policy languages such as Ponder, KAoS, Rei, PeerTrust, and XACML [54]. Typically defined over ontologies, policy languages provide a reliable mechanism for (rule-based) reasoning in open environments, such as PLEs, where the use of roles and institutions the users may belong to is not applicable [55]. Current policy languages allow for contextbased reasoning where one can only leverage the knowledge coming from the shared vocabulary (i.e., ontology) of a community and the individual's reputation in the community.…”
Section: Principle 3: Distributed Identity Managementmentioning
confidence: 99%