Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes
نویسنده
چکیده
This paper systematically discusses the security and privacy concerns for e-learning systems. A five-layer architecture of e-learning system is proposed. The security and privacy concerns are addressed respectively for five layers. This paper further examines the relationship among the security & privacy policy, the available security & privacy technology, and the degree of e-learning privacy & security. The digital identity attributes are introduced to elearning portable devices to enhance the security and privacy of e-learning systems. This will provide significant contributions to the knowledge of e-learning security & privacy research communities and will generate more research interests.
منابع مشابه
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices
Users increasingly use their mobile devices to communicate, to conduct business transaction and access resources and services. In such a scenario, digital identity management (DIM) technology is fundamental in customizing user experience, protecting privacy, underpinning accountability in business transactions, and in complying with regulatory controls. Users identity consists of data, referred...
متن کاملTraceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management
Digital identity is defined as the digital representation of the information known about a specific individual or organization. An emerging approach for protecting identities of individuals while at the same time enhancing user convenience is to focus on inter-organization management of identity information. This is referred to as federated identity management. In this paper we develop an appro...
متن کاملTraceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management
Digital identity is defined as the digital representation of the information known about a specific individual or organization. An emerging approach for protecting identities of individuals while at the same time enhancing user convenience is to focus on inter-organization management of identity information. This is referred to as federated identity management. In this paper we develop an appro...
متن کاملMobile Identity Management
Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their customers. Users may benefit from identity management to simplify logging in to websites and computer ...
متن کاملAn Approach for Preserving Privacy and Protecting Personally Identifiable Information in Cloud Computing
Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of ITservices on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. The expected loss from a single breach can be sig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. UCS
دوره 17 شماره
صفحات -
تاریخ انتشار 2011