Abstract
The preservation of confidentiality has become a major issue for the majority of applications that process personal information, the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. A great deal of research has already been conducted in educational environments. However, one aspect that has not received much attention is the important role of Information Security, especially in newer education environments such as the e-learning environment. In this article we seek to propose a policy of security in such a way to affect views of profiles for each user to control the information accessed by this user.



Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Alotaiby, F. T., & Chen, J. X. (2004). A model for team-based access control (TMAC 2004). In Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on (Vol. 1, pp. 450–454). IEEE.
Bell, D. E., & La Padula, L. J. (1976). Secure computer system: Unified exposition and multics interpretation (No. MTR-2997-REV-1). MITRE CORP BEDFORD MA.
Biba, K. J. (1975). Integrity consideration for secure computer systems. Technical raport MTR-3153, The MITRE corpooration.
El-Khatib, K., Korba, L., Xu, Y., & Yee, G. (2003). Privacy and security in e-learning. International Journal of Distance Education Technologies (IJDET),1(4), 1–19.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3), 224–274.
Gavrila, S. I., & Barkley, J. F. (1998). Formal specification for role based access control user/role and role/role relationship management. In Proceedings of the third ACM workshop on Role-based access control (pp. 81–90). ACM.
Jeghal, A., Oughdir, L., Tairi, H., & El Affar, A. (2013). A model of the reuse of the profiles of learners. Journal of Theoretical & Applied Information Technology, 57(2), 288–293.
Jerman-Blažič, B., & Klobučar, T. (2005). Privacy provision in e-learning standardized systems: status and improvements. Computer Standards & Interfaces, 27(6), 561–578.
Joshi, J. B., Aref, W. G., Ghafoor, A., & Spafford, E. H. (2001). Security models for web-based applications. Communications of the ACM, 44(2), 38–44.
Lampson, B. W. (1974). Protection. ACM SIGOPS Operating Systems Review, 8(1), 18–24.
Sandhu, R. S., & Samarati, P. (1994). Access control: principle and practice. Communications Magazine, IEEE, 32(9), 40–48.
Weippl, E. R. (2005). Security in E-learning. eLearn Magazine, 2005(3), 3.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jeghal, A., Oughdir, L. & Tairi, H. Politic of security, privacy and transparency in human learning systems. Educ Inf Technol 21, 521–530 (2016). https://doi.org/10.1007/s10639-014-9336-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10639-014-9336-6