Csac 2004
نویسندگان
چکیده
In this paper we propose a new coordination approach for the AulaNet Learning Management System. The proposed coordination protocol is based on a workflow mechanism that could be used by teachers to define some specific sequence of activities within a course run within AulaNet. This way, at least part of the social protocol that governs the flow of the course could be enforced by software.
منابع مشابه
Themes and Highlights of the New Security Paradigms Workshop 2004
This panel highlights a selection of the most interesting and provocative papers from the 2004 New Security Paradigms Workshop. This workshop was held September 2004 the URL for more information is . The panel consists of authors of the selected papers, and the session is moderated by the workshop’s general chairs. We present selected papers focusing on exciting major theme...
متن کاملThe Cyber Enemy Within ... Countering the Threat from Malicious Insiders
One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization’s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is ...
متن کاملThe Australian Coding Standards Advisory Committee.
The National Centre for Classification in Health (NCCH), then the National Coding Centre, established CSAC in 1994. The main function of CSAC is to introduce new and amended International statistical classification of diseases and related health problems, tenth revision, Australian modification (ICD-10-AM) codes and Australian coding standards. In addition, CSAC: • provides advice regarding act...
متن کاملThe Relationship of System & Product Specifications and Evaluations
The security properties of Information Technology (IT) products and systems are important to the national security, critical infrastructure, and economic health of advanced society. These properties are studied, tested, and evaluated to provide information for decisions concerning trustworthiness and suitability for purpose. This panel will address present and future approaches to these determi...
متن کاملThe Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs to withstand malicious attack. The process encompasses the addition of a series of securityfocused activities and deliverables to each of the phases of Microsoft's software development process. These activities and del...
متن کامل