Skip to main content

Development of E-Learning Design Criteria with Secure Realization Concepts

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5090))

Abstract

This article introduces design criteria for e-learning systems based on implications from the disciplines of educational science, software engineering, and information security. Theoretical realization concepts to implement stated requirements are discussed. A conceptual implementation of a proxy server realized within this research project is also presented. This proxy server demonstrates the feasibility of stated concepts and enables outsourcing of security-related tasks to an automated process.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Åhlfeldt, R.-M., Spagnoletti, P., Sindre, G.: Improving the Information Security Model by using TFI. In: [16], pp. 73–85

    Google Scholar 

  2. Anderson, A.: Effective Management of Information Security and Privacy. Educause Quarterly Journal (1), 15–20 (2006)

    Google Scholar 

  3. Anderson, R.: Security Engineering – A Guide to Building Dependable Distributed Systems. Wiley Computer Publishing, New York (2001)

    Google Scholar 

  4. Eibl, C.J.: Information Security in E-Learning. In: Abbott, C., Lustigova, Z. (eds.) Information Technologies for Education and Training. Proc. of IFIP iTET, University of Prague, pp. 204–213 (2007)

    Google Scholar 

  5. Eibl, C.J., von Solms, S.H., Schubert, S.: Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. In: [16], pp. 181–192 (2007)

    Google Scholar 

  6. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol. HTTP/1.1. Request for Comments (RFC) 2616 (1999)

    Google Scholar 

  7. Graf, F.: Lernspezifische Sicherheitsmechanismen in Lernumgebungen mit modularem Lernmaterial. Dissertation thesis (German), TU Darmstadt (2002)

    Google Scholar 

  8. Hamid, A.A.: e-Learning: Is it the “e” or the learning that matters? Internet and Higher Education 4(3), 311–316 (2002)

    Article  Google Scholar 

  9. Hills, P.J.: Teaching and Learning as a Communication Process. Croom Helm, London (1979)

    Google Scholar 

  10. Koulountzos, V., Seroglou, F.: Designing a web-based learning environment. The case of ATLAS. In: Benzie, D., Iding, M. (eds.) Informatics, Mathematics and ICT: A golden triangle. Proceedings, Boston, USA, June 27-29 (2007) ISBN-13: 978-0-615-14623-2

    Google Scholar 

  11. Lave, J., Wenger, E.: Situated learning: Legitimate peripheral participation. Cambridge University Press, New York (1991)

    Google Scholar 

  12. McCarthy, M.P., Campbell, S.: Security Transformation: Digital Defense Strategies to Protect Your Company’s Reputation & Market Share. McGraw-Hill, New York (2001)

    Google Scholar 

  13. National Research Council (U.S.): Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington, DC (1991)

    Google Scholar 

  14. Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)

    Google Scholar 

  15. Stacey, E., Gerbic, P.: Teaching for blended learning. How is ICT impacting on distance and on campus education? In: Kumar, D., Turner, J. (eds.) Education for the 21st Century-Impact of ICT and Digital Resources: Proceedings of the IFIP 19th World Computer Congress, TC-3, Education, pp. 225–234. Springer, Boston (2006)

    Google Scholar 

  16. Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R.: New Approaches for Security, Privacy and Trust in Complex Environments. IFIP sec2007. Springer, New York (2007)

    Book  Google Scholar 

  17. Voydock, V.L., Kent, S.T.: Security Mechanisms in High-Level Network Protocols. ACM Computing Surveys 15(2), 135–171 (1983)

    Article  MathSciNet  Google Scholar 

  18. Weippl, E.R.: Security in E-Learning. Springer, New York (2005)

    Google Scholar 

  19. Yasinsac, A., Manzano, Y.: Policies to Enhance Computer and Network Forensics. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, June 5-6 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Roland T. Mittermeir Maciej M. Sysło

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Eibl, C.J., Schubert, S.E. (2008). Development of E-Learning Design Criteria with Secure Realization Concepts. In: Mittermeir, R.T., Sysło, M.M. (eds) Informatics Education - Supporting Computational Thinking. ISSEP 2008. Lecture Notes in Computer Science, vol 5090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69924-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69924-8_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69923-1

  • Online ISBN: 978-3-540-69924-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics