Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conference ... Federation for Information Processing)
Hi-index | 0.01 |
This article introduces design criteria for e-learning systems based on implications from the disciplines of educational science, software engineering, and information security. Theoretical realization concepts to implement stated requirements are discussed. A conceptual implementation of a proxy server realized within this research project is also presented. This proxy server demonstrates the feasibility of stated concepts and enables outsourcing of security-related tasks to an automated process.