Role-Based Access Control Models
Computer
Specifying and managing role-based access control within a corporate intranet
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Implementing role-based access control using object technology
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Application of XML tools for enterprise-wide RBAC implementation tasks
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Supporting Student Discussions: it isn‘t Just Talk
Education and Information Technologies
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Selecting a Security Architecture for a New Model of Distributed Tutorial Support
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
How Role Based Access Control is Implemented in SESAME
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Learning from other people's dialogues: questions about computer-based answers
Innovative Adult Learning with Innovative Technologies
Vicarious learning from educational dialogue
CSCL '99 Proceedings of the 1999 conference on Computer support for collaborative learning
Secure and efficient information sharing in multi-university E-Learning environments
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
Protecting disseminative information in E-Learning
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
Hi-index | 0.00 |
Existing software systems designed to support learning do not adequately provide for vicarious learning in a cross-institutional collaborative environment. We have developed an architecture based on role-based access control, which provides the necessary security, robustness, flexibility, and explicit formulation of policy. Such an architecture is general enough to be used in a variety of educational institutions and settings, yet flexible enough to allow a wide range of policies within a single system.