2003
DOI: 10.4018/jdet.2003100101
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Security in E-Learning

Abstract: /npsi/ctrl?action=rtdoc&an=5763176&lang=en http://nparc.cisti-icist.nrc-cnrc.gc.ca/npsi/ctrl?action=rtdoc&an=5763176&lang=frAccess and use of this website and the material on it are subject to the Terms and Conditions set forth at http://nparc.cisti-icist.nrc-cnrc.gc.ca/npsi/jsp/nparc_cp.jsp?lang=en NRC Publications Archive Archives des publications du CNRC Privacy and Security in E-LearningYee, George; Xu, Y.; Korba, Larry; El-Khatib, K. ABSTRACTFor a variety of advantages, universities and other organizatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
23
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 69 publications
(24 citation statements)
references
References 17 publications
1
23
0
Order By: Relevance
“…In [1] the authors examined the privacy principles that have to be applied during the implementation of e-learning software, along with the identification of components that require privacy and security safeguards. All this is described in a pure theoretical level of prevention.…”
Section: A E-learning and Web Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [1] the authors examined the privacy principles that have to be applied during the implementation of e-learning software, along with the identification of components that require privacy and security safeguards. All this is described in a pure theoretical level of prevention.…”
Section: A E-learning and Web Applicationsmentioning
confidence: 99%
“…For various reasons, not all of them apply to web based e-learning software 1 . The most serious of those mentioned that can be applied here, are: (1) SQL Injection (2) Cross Site Scripting (3) Buffer Overflow or similar weaknesses (4) Sensitive Information transmitted over http (Not over https).…”
Section: A Sans Institutementioning
confidence: 99%
“…Furthermore, using Shibboleth implies the existence of institutions users belong to -which is an assumption that does not apply in an open scenario for lifelong learning. [6] provides an abstract overview on privacy and security issues in advanced learning technologies, suggesting that policies may be used in an educational context. But neither scenarios nor specific details are provided.…”
Section: Related Workmentioning
confidence: 99%
“…The well-known least privilege security principle can be implemented through partial delegation. Although the concept of delegation is not new in authorizations [6], [11], [36], [38], role-based delegation has received attention only recently [40], [41]. Aura [6] introduced keyoriented discretionary access control systems that are based on delegation of access rights with public-key certificates.…”
mentioning
confidence: 99%