skip to main content
10.1145/967900.968095acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

An architecture for supporting vicarious learning in a distributed environment

Published:14 March 2004Publication History

ABSTRACT

Existing software systems designed to support learning do not adequately provide for vicarious learning in a cross-institutional collaborative environment. We have developed an architecture based on role-based access control, which provides the necessary security, robustness, flexibility, and explicit formulation of policy. Such an architecture is general enough to be used in a variety of educational institutions and settings, yet flexible enough to allow a wide range of policies within a single system.

References

  1. G. J. Ahn and R. Sandhu. Role Based Authorization Constraints Specification. ACM Transaction on Information and System Security, 3(4), November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Bacon, K. Moody, D. Chadwick, and O. Otenko. Persistent versus Dynamic Role Membership. In IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado, August 2003.Google ScholarGoogle Scholar
  3. J. Bacon, K. Moody, and W. Yao. Access Control and Trust in the Use of Widely Distributed Services. In Proceedings of the 3rd International Conference on Middleware, volume 2218 of Lecture Notes in Computer Science, pages 295--310, Heidelberg, November 2001. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Bacon, K. Moody, and W. Yao. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security, 5(4):492--540, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. F. Barkley. Implementing Role Based Access Control using Object Technology. In First ACM Workshop on Role Based Access Control, November 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. F. Barkley, A. V. Cincotta, D. F. Ferraiolo, S. Gavrilla, and R. D. Kuhn. Role Based Access Control for the World Wide Web. In 20th National Information System Security Conference. NIST/NSA, 1997.Google ScholarGoogle Scholar
  7. E. P. Bertino, P. A. Bonatti, and E. Ferrari. TRABC: A Temporal Role-Based Access Control Model. In 5th ACM Workshop on Role-based Access Control, Berlin, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Chandramouli. Application of XML Tools for Enterprise-Wide RBAC Implementation Task. In 5th ACM Workshop on Role-based Access Control, Berlin, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Ferraiolo and J. Barkley. Specifying and managing Role-Based Access Control within a Corporate Intranet. In 2nd ACM Workshop on Role-based Access Control, Berline, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Gong and J. Newman. Selecting a Security Architecture for a New Model of Distributed Tutorial Support. In Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 89--94, Los Alamitos, CA, June 2002. Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Hayton, J. Bacon, and K. Moody. OASIS: Access Control in an Open, Distributed Environment. In Proceedings IEEE Symposium on Security and Privacy, pages 3--14, Oakland CA, May 1998.Google ScholarGoogle Scholar
  12. D. Laurillard. Rethinking University Teaching: A Framework for the Effective Use of Educational Technology. Routledge, 1993.Google ScholarGoogle Scholar
  13. J. Lee, F. Dineen, and J. McKendree. Supporting Student Discussions: It Isn't Talk. Education and Information Technologies, 3:217--229, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. V. M., R. Govaerts, and J. Vandewalle. How Role Based Access Control is implemented in SESAME. In IEEE 6th WETICE, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Mayes. Learning Technology and Groundhog Day. In W. Strang, V. Simpson, and D. E. Slater, editors, Proceedings of Hypermedia at Work: Practice and Theory in Higher Education. University of Kent at Canterbury, 1995.Google ScholarGoogle Scholar
  16. J. T. Mayes and I. Neilson. Learning from other people's dialogues: questions about computer-based answers. In B. B. Collis and G. Davies, editors, Innovative Adult Learning with Innovative Technologies, volume 1, pages 31--47. Elsevier Science B. V., Amsterdam, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Mayes and F. Dineen. Developing Tertiary Courseware through capturing Task Directed Discussions. In Proceedings of ED-MEDIA, Seattle, USA, 1999.Google ScholarGoogle Scholar
  18. J. McKendree, K. Stenning, T. Mayes, J. Lee, and R. Cox. Why observing a dialogue may benefit learning. Journal of Computer Assisted Learning, 14:110--119, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  19. R. Monthienvichienchai and M. A. Sasse. Learning from Others' Mistakes Through Computer Supported Vicarious Learning. In Proceedings of the 4th LTSN Conference, Galway, Ireland, August 2003.Google ScholarGoogle Scholar
  20. J. Newman, T. Mayes, D. Benyon, S. Draper, P. Gray, A. Kilgour, and L. Mackinnon. Lessons from a Multi-university Remote Tutoring Community --- MANTCHI. In Proceedings of the 3rd International Conference on the Role of Universities in the Future Information Society: The Virtual University. Flagstaff, Arizona, 1999.Google ScholarGoogle Scholar
  21. R. Sandhu, D. Ferraiolo, and R. Kuhn. The NIST model for role-based access control: towards a unified standard. In Proceedings of the fifth ACM workshop on Role-based access control, pages 47--63, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role Based Access Control Models. IEEE Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K. Stenning, J. McKendree, J. Lee, R. Cox, F. Dineen, and T. Mayes. Vicarious Learning from Educational Dialogue. In C. Hoadley and J. Roschelle, editors, Proceedings of Computer Support for Co-operative Learning: Designing New Media for a New Millenium, pages 341--347, Stanford University, Palo Alto, CA, December 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An architecture for supporting vicarious learning in a distributed environment

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '04: Proceedings of the 2004 ACM symposium on Applied computing
      March 2004
      1733 pages
      ISBN:1581138121
      DOI:10.1145/967900

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 March 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,650of6,669submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader