Csac 2004

نویسندگان

  • José Cordeiro
  • Joaquim Filipe
  • Alberto B. Raposo
  • Mariano G. Pimentel
  • Marco A. Gerosa
  • Carlos J. P. de Lucena
چکیده

In this paper we propose a new coordination approach for the AulaNet Learning Management System. The proposed coordination protocol is based on a workflow mechanism that could be used by teachers to define some specific sequence of activities within a course run within AulaNet. This way, at least part of the social protocol that governs the flow of the course could be enforced by software.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Themes and Highlights of the New Security Paradigms Workshop 2004

This panel highlights a selection of the most interesting and provocative papers from the 2004 New Security Paradigms Workshop. This workshop was held September 2004 the URL for more information is . The panel consists of authors of the selected papers, and the session is moderated by the workshop’s general chairs. We present selected papers focusing on exciting major theme...

متن کامل

The Cyber Enemy Within ... Countering the Threat from Malicious Insiders

One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization’s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is ...

متن کامل

The Australian Coding Standards Advisory Committee.

The National Centre for Classification in Health (NCCH), then the National Coding Centre, established CSAC in 1994. The main function of CSAC is to introduce new and amended International statistical classification of diseases and related health problems, tenth revision, Australian modification (ICD-10-AM) codes and Australian coding standards. In addition, CSAC: • provides advice regarding act...

متن کامل

The Relationship of System & Product Specifications and Evaluations

The security properties of Information Technology (IT) products and systems are important to the national security, critical infrastructure, and economic health of advanced society. These properties are studied, tested, and evaluated to provide information for decisions concerning trustworthiness and suitability for purpose. This panel will address present and future approaches to these determi...

متن کامل

The Trustworthy Computing Security Development Lifecycle

This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs to withstand malicious attack. The process encompasses the addition of a series of securityfocused activities and deliverables to each of the phases of Microsoft's software development process. These activities and del...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004