skip to main content
10.1145/2637748.2638426acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesi-knowConference Proceedingsconference-collections
research-article

Security concepts for a distributed architecture for activity logging and analysis

Published: 16 September 2014 Publication History

Abstract

We describe security concepts for a distributed architecture for activity logging and analysis. The described system collects user and usage data from multiple devices (PC and mobile). Such data is used to create open learner models for reflection on and improvement of time management. Additionally, such data is the basis for adaptation of notification mechanisms. We propose concepts for secure local storage of collected data, network communication and user authentication, and secure data storage and processing on the server side. We only touch partially on security concepts for client services and applications. The proposed concept is thus applicable for all systems with distributed activity logging and server-based analysis components.

References

[1]
P. Brusilovsky and E. Millán. User Models for Adaptive Hypermedia and Adaptive Educational Systems. In P. Brusilovsky, A. Kobsa, and W. Nejdl, editors, The Adaptive Web, pages 3--53. Springer-Verlag, 2007.
[2]
S. Bull, V. Dimitrova, and G. McCalla. Open learner models: Research questions. International Journal of Artificial Intelligence in Education, 17(2), 2007.
[3]
X. Jiang and J. Landay. Modeling privacy control in context-aware systems. IEEE Pervasive Computing, 1(3):59--63, 2002.
[4]
J. Kay and B. Kummerfeld. Adaptive Technologies for Training and Education, chapter Lifelong Learner Modeling. Cambridge University Press, 2011.
[5]
S. N. Lindstaedt, G. Beham, B. Kump, and T. Ley. Getting to know your user --- unobtrusive user model maintenance within work-integrated learning environments. In Proceedings of the 4th European Conference on Technology Enhanced Learning, EC-TEL '09, pages 73--87, Berlin, Heidelberg, 2009. Springer-Verlag.
[6]
H. Stern, V. Pammer, and S. Lindstaedt. A preliminary study on interruptibility detection based on location and calendar information. In Proceedings of 3rd Workshop on Context-Systems Design, Evaluation and Optimisation, at MobiQuitous2011 (to appear), 2011.
[7]
R. Toegl, M. Pirker, and M. Gissing. acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In Trusted Systems - Second International Conference (INTRUST), Revised Selected Papers, volume 6802 of Lecture Notes in Computer Science, pages 326--345. Springer Verlag, 2010.
[8]
Trusted Computing Group. TCG TPM Specification Version 1.2, 2007.
[9]
Y. Wang and A. Kobsa. Intelligent User Interfaces: Adaptation and Personalization Systems and Technologies., chapter Technical Solutions for Privacy-Enhanced Personalization, pages 353--376. IGI Global, 2008.
[10]
Y. Wang and A. Kobsa. A generic privacy-enhancing personalization infrastructure (system demonstration). In Adjunct Proceedings of the 18th International Conference on User Modeling, Adaptation and Personalization, pages 61--63, 2010.

Cited By

View all
  • (2021)Data-Related Ethics Issues in Technologies for Informal Professional LearningInternational Journal of Artificial Intelligence in Education10.1007/s40593-021-00259-x32:3(609-635)Online publication date: 12-Jul-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
i-KNOW '14: Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business
September 2014
262 pages
ISBN:9781450327695
DOI:10.1145/2637748
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 September 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. activity log data analysis
  2. activity logging
  3. security analysis
  4. security concept
  5. ubiquitous technologies

Qualifiers

  • Research-article

Funding Sources

Conference

i-KNOW '14

Acceptance Rates

i-KNOW '14 Paper Acceptance Rate 25 of 73 submissions, 34%;
Overall Acceptance Rate 77 of 238 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Data-Related Ethics Issues in Technologies for Informal Professional LearningInternational Journal of Artificial Intelligence in Education10.1007/s40593-021-00259-x32:3(609-635)Online publication date: 12-Jul-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media