ABSTRACT
Existing software systems designed to support learning do not adequately provide for vicarious learning in a cross-institutional collaborative environment. We have developed an architecture based on role-based access control, which provides the necessary security, robustness, flexibility, and explicit formulation of policy. Such an architecture is general enough to be used in a variety of educational institutions and settings, yet flexible enough to allow a wide range of policies within a single system.
- G. J. Ahn and R. Sandhu. Role Based Authorization Constraints Specification. ACM Transaction on Information and System Security, 3(4), November 2000. Google ScholarDigital Library
- J. Bacon, K. Moody, D. Chadwick, and O. Otenko. Persistent versus Dynamic Role Membership. In IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado, August 2003.Google Scholar
- J. Bacon, K. Moody, and W. Yao. Access Control and Trust in the Use of Widely Distributed Services. In Proceedings of the 3rd International Conference on Middleware, volume 2218 of Lecture Notes in Computer Science, pages 295--310, Heidelberg, November 2001. Springer. Google ScholarDigital Library
- J. Bacon, K. Moody, and W. Yao. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security, 5(4):492--540, November 2002. Google ScholarDigital Library
- J. F. Barkley. Implementing Role Based Access Control using Object Technology. In First ACM Workshop on Role Based Access Control, November 1995. Google ScholarDigital Library
- J. F. Barkley, A. V. Cincotta, D. F. Ferraiolo, S. Gavrilla, and R. D. Kuhn. Role Based Access Control for the World Wide Web. In 20th National Information System Security Conference. NIST/NSA, 1997.Google Scholar
- E. P. Bertino, P. A. Bonatti, and E. Ferrari. TRABC: A Temporal Role-Based Access Control Model. In 5th ACM Workshop on Role-based Access Control, Berlin, 2000. Google ScholarDigital Library
- R. Chandramouli. Application of XML Tools for Enterprise-Wide RBAC Implementation Task. In 5th ACM Workshop on Role-based Access Control, Berlin, 2000. Google ScholarDigital Library
- D. Ferraiolo and J. Barkley. Specifying and managing Role-Based Access Control within a Corporate Intranet. In 2nd ACM Workshop on Role-based Access Control, Berline, 1997. Google ScholarDigital Library
- X. Gong and J. Newman. Selecting a Security Architecture for a New Model of Distributed Tutorial Support. In Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 89--94, Los Alamitos, CA, June 2002. Computer Society Press. Google ScholarDigital Library
- R. Hayton, J. Bacon, and K. Moody. OASIS: Access Control in an Open, Distributed Environment. In Proceedings IEEE Symposium on Security and Privacy, pages 3--14, Oakland CA, May 1998.Google Scholar
- D. Laurillard. Rethinking University Teaching: A Framework for the Effective Use of Educational Technology. Routledge, 1993.Google Scholar
- J. Lee, F. Dineen, and J. McKendree. Supporting Student Discussions: It Isn't Talk. Education and Information Technologies, 3:217--229, 1998. Google ScholarDigital Library
- V. M., R. Govaerts, and J. Vandewalle. How Role Based Access Control is implemented in SESAME. In IEEE 6th WETICE, 1997. Google ScholarDigital Library
- J. Mayes. Learning Technology and Groundhog Day. In W. Strang, V. Simpson, and D. E. Slater, editors, Proceedings of Hypermedia at Work: Practice and Theory in Higher Education. University of Kent at Canterbury, 1995.Google Scholar
- J. T. Mayes and I. Neilson. Learning from other people's dialogues: questions about computer-based answers. In B. B. Collis and G. Davies, editors, Innovative Adult Learning with Innovative Technologies, volume 1, pages 31--47. Elsevier Science B. V., Amsterdam, 1995. Google ScholarDigital Library
- T. Mayes and F. Dineen. Developing Tertiary Courseware through capturing Task Directed Discussions. In Proceedings of ED-MEDIA, Seattle, USA, 1999.Google Scholar
- J. McKendree, K. Stenning, T. Mayes, J. Lee, and R. Cox. Why observing a dialogue may benefit learning. Journal of Computer Assisted Learning, 14:110--119, 1998.Google ScholarCross Ref
- R. Monthienvichienchai and M. A. Sasse. Learning from Others' Mistakes Through Computer Supported Vicarious Learning. In Proceedings of the 4th LTSN Conference, Galway, Ireland, August 2003.Google Scholar
- J. Newman, T. Mayes, D. Benyon, S. Draper, P. Gray, A. Kilgour, and L. Mackinnon. Lessons from a Multi-university Remote Tutoring Community --- MANTCHI. In Proceedings of the 3rd International Conference on the Role of Universities in the Future Information Society: The Virtual University. Flagstaff, Arizona, 1999.Google Scholar
- R. Sandhu, D. Ferraiolo, and R. Kuhn. The NIST model for role-based access control: towards a unified standard. In Proceedings of the fifth ACM workshop on Role-based access control, pages 47--63, 2000. Google ScholarDigital Library
- R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role Based Access Control Models. IEEE Computer, 29(2):38--47, 1996. Google ScholarDigital Library
- K. Stenning, J. McKendree, J. Lee, R. Cox, F. Dineen, and T. Mayes. Vicarious Learning from Educational Dialogue. In C. Hoadley and J. Roschelle, editors, Proceedings of Computer Support for Co-operative Learning: Designing New Media for a New Millenium, pages 341--347, Stanford University, Palo Alto, CA, December 1999. Google ScholarDigital Library
Index Terms
- An architecture for supporting vicarious learning in a distributed environment
Recommendations
A model of OASIS role-based access control and its support for active security
OASIS is a role-based access control architecture for achieving secure interoperation of services in an open, distributed environment. The aim of OASIS is to allow autonomous management domains to specify their own access control policies and to ...
Access control and trust in the use of widely distributed services
Special issue: MiddlewareOASIS is a role-based access control (RBAC) architecture for achieving secure interoperation of independently managed services in an open, distributed environment. OASIS differs from other RBAC schemes in a number of ways: role management is ...
A model of OASIS role-based access control and its support for active security
SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologiesOASIS is a role-based access control architecture for achieving secure interoperation of services in an open, distributed environment. Services define roles and implement formally specified policy for role activation and service use; users must present ...
Comments