Abstract
Nowadays, people are in need for continuous learning in order to keep up to date or be upgraded in their job. An infrastructure for lifelong learning requires continuous adaptation to learners needs and must also provide flexible ways for students to use and personalize them. Controlling who can access a document, specifying when a student may be contacted for interactive instant messaging or periodical reminders in order to increase motivation for collaboration are just some examples of typical statements that may be specified by e.g., learners and learning management system administrators. This paper shows how policies can represent a way of expressing these statements and describes the extra benefits of its adoption like flexibility, dynamicity and interoperability.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anderson, A.H.: An introduction to the web services policy language (wspl). In: POLICY 2004. Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, p. 189. IEEE Computer Society, Washington, DC, USA (2004)
Bonatti, P.A., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: POLICY 2005. 6th IEEE International Workshop on Policies for Distributed Systems and Networks, Stockholm, Sweden, pp. 14–23. IEEE Computer Society, Los Alamitos (2005)
Bonatti, P.A., Olmedilla, D., Peer, J.: Advanced policy explanations on the web. In: Piero, A. (ed.) ECAI 2006. 17th European Conference on Artificial Intelligence, Riva del Garda, Italy, pp. 200–204. IOS Press, Amsterdam (2006)
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–38. Springer, Heidelberg (2001)
Duma, C., Herzog, A., Shahmehri, N.: Privacy in the semantic web: What policy languages have to offer. In: POLICY 2007. 8th IEEE International Workshop on Policies for Distributed Systems and Networks, Bologna, Italy, IEEE Computer Society, Los Alamitos (2007)
El-Khatib, Korba, Xu, Yee: Privacy and security in e-learning. International Journal of Distance Education (2003)
Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K.E., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol. 3053, pp. 342–356. Springer, Heidelberg (2004)
Hatala, M., Eap, T.M.T., Shah, A.: Unlocking repositories: Federated security solution for attribute and policy based access to repositories via web services. In: ARES 2006. Proceedings of the First International Conference on Availability, Reliability and Security, pp. 895–903. IEEE Computer Society, Washington, DC, USA (2006)
Kagal, L., Finin, T.W., Joshi, A.: A policy language for a pervasive computing environment. In: POLICY 2003. 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy, p. 63. IEEE Computer Society, Los Alamitos (2003)
The lionshare project, http://lionshare.its.psu.edu/
Nabeth, T., Roda, C., Angehrn, A.A., Mittal, P.K.: Using artificial agents to stimulate participation in virtual communities. In: IADIS International Conference CELDA (Cognition and Exploratory Learning in Digital Age) (2005)
Nejdl, W., Wolf, B., Qu, C., Decker, S., Sintek, M., Naeve, A., Nilsson, M., Palmer, M., Risch, T., Edutella, A.: P2P networking infrastructure based on RDF. In: WWW 2002. 11th International World Wide Web Conference, Hawaii, USA (June 2002)
OASIS eXtensible Access Control Markup Language, http://www.oasis-open.org/specs/index.php#xacmlv2.0
TENCompetence: building the european network for lifelong competence development. http://www.tencompetence.org/
Uszok, A., Bradshaw, J.M., Jeffers, R., Suri, N., Hayes, P.J., Breedy, M.R., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: POLICY 2003. 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy, p. 93. IEEE Computer Society, Los Alamitos (2003)
Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, IEEE Press, Los Alamitos (2000)
Yang, Lin, Lin: Policy-based privacy and security management for collaborative e-education systems. In: 5th IASTED Multi-Conference Computers and Advanced Technology in Education, Cancun, Mexico (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
De Coi, J.L., Kärger, P., Koesling, A.W., Olmedilla, D. (2007). Exploiting Policies in an Open Infrastructure for Lifelong Learning. In: Duval, E., Klamma, R., Wolpers, M. (eds) Creating New Learning Experiences on a Global Scale. EC-TEL 2007. Lecture Notes in Computer Science, vol 4753. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75195-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-75195-3_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75194-6
Online ISBN: 978-3-540-75195-3
eBook Packages: Computer ScienceComputer Science (R0)