This paper presents a policy-based privacy and security management scheme for collaborative e-education systems. Privacy and security management is inevitable in e-education systems. Using the Ponder [2] as policy language specification, we explore how to specify and implement four commonly used policies in e-education systems: security management policies, privacy policies, access control policies, and collaborative policies. Some examples from a real e-education project are given to show the potential of this scheme.Le pr\ue9sent document fournit un plan de gestion de la protection des renseignements et de la s\ue9curit\ue9 fond\ue9e sur des politiques aux fins de syst\ue8mes de cyberenseignement coop\ue9ratif. Les questions li\ue9es \ue0...
The rapid growth of the Internet has been accompanied by a proliferation of e-services targeting con...
Security considerations play an increasingly important role for distributed computing. At the same t...
Security, privacy, Bring Your Own Device (BYOD), and other information technology usage policies are...
For a variety of advantages, universities and other organizations are resorting to e-learning to pro...
This chapter begins by introducing the reader to privacy policies, e-services, and privacy managemen...
This paper systematically addresses the security and pricacy concerns for e-learning systems. An eff...
As with traditional face-to-face education, "trust" is an important factor for the interactive e-lea...
Abstract The preservation of confidentiality has become a major issue for themajority of application...
Part 1: Invited PapersInternational audienceIn this paper we present our institute’s vision towards ...
This paper systematically discusses the security and privacy concerns for e-learning systems. A five...
Abstract—An expectation of trust influences a learner’s participation in collaborative learning acti...
Growth of the Internet has been accompanied by growth of Internet e-services (e.g. e-commerce, e-hea...
Abstract In [13] Dutch government proposes an identity scheme sup-porting personal data exchange of ...
Abstract: E-Learning 2.0 uses Web 2.0 tools for e-learning. New services on the Internet can be swif...
The field of research on information technology applications in the design of computer supported col...
The rapid growth of the Internet has been accompanied by a proliferation of e-services targeting con...
Security considerations play an increasingly important role for distributed computing. At the same t...
Security, privacy, Bring Your Own Device (BYOD), and other information technology usage policies are...
For a variety of advantages, universities and other organizations are resorting to e-learning to pro...
This chapter begins by introducing the reader to privacy policies, e-services, and privacy managemen...
This paper systematically addresses the security and pricacy concerns for e-learning systems. An eff...
As with traditional face-to-face education, "trust" is an important factor for the interactive e-lea...
Abstract The preservation of confidentiality has become a major issue for themajority of application...
Part 1: Invited PapersInternational audienceIn this paper we present our institute’s vision towards ...
This paper systematically discusses the security and privacy concerns for e-learning systems. A five...
Abstract—An expectation of trust influences a learner’s participation in collaborative learning acti...
Growth of the Internet has been accompanied by growth of Internet e-services (e.g. e-commerce, e-hea...
Abstract In [13] Dutch government proposes an identity scheme sup-porting personal data exchange of ...
Abstract: E-Learning 2.0 uses Web 2.0 tools for e-learning. New services on the Internet can be swif...
The field of research on information technology applications in the design of computer supported col...
The rapid growth of the Internet has been accompanied by a proliferation of e-services targeting con...
Security considerations play an increasingly important role for distributed computing. At the same t...
Security, privacy, Bring Your Own Device (BYOD), and other information technology usage policies are...