Abstract
Digital information sharing of multi-university environments usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure manner poses a difficult and vital challenge. This paper aims to build a new rule-based framework to identify and address issues of sharing in multi-university environments through role-based access control management (RBAC). The framework includes a role-based group delegation granting model, group delegation revocation model, authorization granting and authorization revocation. Finally, the current proposal is compared with other related work.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15(4), 706–734 (1993)
Barka, E., Sandhu, R.: Framework for role-based delegation models and some extensions. In: Proceedings of the 16 Annual Computer Security Applications Conference, New Orleans, pp. 168–177 (2000)
Edgar, R.W.: Security in E-Learning, vol. 16. Springer, Heidelberg (2005)
El-Khatib, K., Korba, L., Xu, Y., Yee, G.: Privacy and security in e-learning. International Journal of Distance Education Technologies 1(4), 11–30 (2003)
Feinstein, H.L.: Final report: Nist small business innovative research (sbir) grant: role based access control: phase 1. technical report. In: SETA Corp. (1995)
Ferraiolo, D., Cugini, J., Kuhn, R.: Role-based access control (rbac): Features and motivations. In: The 11th Annual Computer Security Applications Conference, New Orleans, LA, pp. 241–248 (1995)
Ferraiolo, D.F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference, pp. 554–563 (1992)
Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: Role-based access control model and reference implementation within a corporate intranet. In: TISSEC, vol. 2, pp. 34–64 (1999)
Frolik, J., Weller, T.M.: Wireless sensor systems: an approach for a multiuniversity design course. IEEE Transactions on Education 45(2), 135–141 (2002)
Hagstrom, A., Jajodia, S., Presicce, F., Wijesekera, D.: Revocations-a classification. In: Proceedings of 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, pp. 44–58 (2001)
Jajodia, S., Samarati, P., Subrahmanian, V., Bertino, E.: A unified framework for enforcing multiple access control policies. In: Proceedings of the 1997 ACM SIGMOD international conference on Management of data, pp. 474–485. ACM Press, New York (1997)
Li, Q., Atluri, V.: Concept-level access control for the semantic web. In: Proceedings of the 2003 ACM workshop on XML security, pp. 94–103. ACM Press, New York (2003)
Lowe, H., Wallis, A.M., Newman, J.: Role-based access control for vicarious learning. In: Proc. European Conference on E-Learning, pp. 43–50. Brunel University, Uxbridge (2002)
Lu, H.: Open multi-agent systems for collaborative web-based learning. International Journal of Distance Education Technologies 2(2), 36–45 (2004)
Mendling, J., Neumann, G., Pinterits, A., Simon, B., Wild, F.: Indirect revenue models for e-learning at universities - the case of learn@wu. In: E-Learning Workshop Hannover - Einsatzkonzepte und Geschftsmodelle, Hannover, Germany (2004)
Michael, H.: XSLT Programmer’s Reference. Wiley, Chichester (2001)
Neely, S., Lowe, H., Eyers, D., Bacon, J., Newman, J., Gong, X.: An architecture for supporting vicarious learning in a distributed environment. In: SAC 2004, pp. 963–970. ACM Press, New York (2004)
Seufert, S.: E-learning business models: Framework and best practice examples. Idea Group, pp. 11–36 (2001)
Wang, H., Cao, J., Zhang, Y.: A consumer anonymity scalable payment scheme with role based access control. In: 2nd International Conference on Web Information Systems Engineering (WISE 2001), Kyoto, Japan, pp. 53–62 (2001)
Wang, H., Cao, J., Zhang, Y.: Formal authorization allocation approaches for role-based access control based on relational algebra operations. In: 3nd International Conference on Web Information Systems Engineering (WISE 2002), Singapore, pp. 301–312 (2002)
Wang, H., Cao, J., Zhang, Y.: Formal authorization allocation approaches for permission-role assignments using relational algebra operations. In: Proceedings of the 14th Australian Database Conference ADC 2003, Adelaide, Australia, pp. 125–133 (2003)
Wang, H., Cao, J., Zhang, Y.: An Electronic Payment Scheme and Its RBAC management. Concurrent Engineering: Research and Application 12(3), 247–275 (2004)
Wang, H., Sun, L., Zhang, Y., Cao, J.: Authorization Algorithms for the Mobility of User-Role Relationship. In: Proceedings of the 28th Australasian Computer Science Conference (ACSC 2005), Newcastle, Australia, pp. 167–176 (2005)
Wang, H., Zhang, Y., Cao, J., Varadharajan, V.: Achieving secure and flexible m-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special issue on M-Services, 697–708 (2003)
Zhang, L., Ahn, G., Chu, B.: A rule-based framework for role-based delegation. In: Proceedings of ACM Symposium on Access Control Models and Technologies, Chantilly, VA, pp. 153–162 (2001)
Zhang, L., Ahn, G., Chu, B.: A role-based delegation framework for healthcare information systems. In: Proceedings of ACM Symposium on Access Control Models and Technologies, Monterey, CA, pp. 125–134 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, H., Li, Q. (2008). Secure and Efficient Information Sharing in Multi-university E-Learning Environments. In: Leung, H., Li, F., Lau, R., Li, Q. (eds) Advances in Web Based Learning – ICWL 2007. ICWL 2007. Lecture Notes in Computer Science, vol 4823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78139-4_48
Download citation
DOI: https://doi.org/10.1007/978-3-540-78139-4_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78138-7
Online ISBN: 978-3-540-78139-4
eBook Packages: Computer ScienceComputer Science (R0)