skip to main content
10.1145/967900.968095acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

An architecture for supporting vicarious learning in a distributed environment

Published: 14 March 2004 Publication History

Abstract

Existing software systems designed to support learning do not adequately provide for vicarious learning in a cross-institutional collaborative environment. We have developed an architecture based on role-based access control, which provides the necessary security, robustness, flexibility, and explicit formulation of policy. Such an architecture is general enough to be used in a variety of educational institutions and settings, yet flexible enough to allow a wide range of policies within a single system.

References

[1]
G. J. Ahn and R. Sandhu. Role Based Authorization Constraints Specification. ACM Transaction on Information and System Security, 3(4), November 2000.
[2]
J. Bacon, K. Moody, D. Chadwick, and O. Otenko. Persistent versus Dynamic Role Membership. In IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado, August 2003.
[3]
J. Bacon, K. Moody, and W. Yao. Access Control and Trust in the Use of Widely Distributed Services. In Proceedings of the 3rd International Conference on Middleware, volume 2218 of Lecture Notes in Computer Science, pages 295--310, Heidelberg, November 2001. Springer.
[4]
J. Bacon, K. Moody, and W. Yao. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security, 5(4):492--540, November 2002.
[5]
J. F. Barkley. Implementing Role Based Access Control using Object Technology. In First ACM Workshop on Role Based Access Control, November 1995.
[6]
J. F. Barkley, A. V. Cincotta, D. F. Ferraiolo, S. Gavrilla, and R. D. Kuhn. Role Based Access Control for the World Wide Web. In 20th National Information System Security Conference. NIST/NSA, 1997.
[7]
E. P. Bertino, P. A. Bonatti, and E. Ferrari. TRABC: A Temporal Role-Based Access Control Model. In 5th ACM Workshop on Role-based Access Control, Berlin, 2000.
[8]
R. Chandramouli. Application of XML Tools for Enterprise-Wide RBAC Implementation Task. In 5th ACM Workshop on Role-based Access Control, Berlin, 2000.
[9]
D. Ferraiolo and J. Barkley. Specifying and managing Role-Based Access Control within a Corporate Intranet. In 2nd ACM Workshop on Role-based Access Control, Berline, 1997.
[10]
X. Gong and J. Newman. Selecting a Security Architecture for a New Model of Distributed Tutorial Support. In Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 89--94, Los Alamitos, CA, June 2002. Computer Society Press.
[11]
R. Hayton, J. Bacon, and K. Moody. OASIS: Access Control in an Open, Distributed Environment. In Proceedings IEEE Symposium on Security and Privacy, pages 3--14, Oakland CA, May 1998.
[12]
D. Laurillard. Rethinking University Teaching: A Framework for the Effective Use of Educational Technology. Routledge, 1993.
[13]
J. Lee, F. Dineen, and J. McKendree. Supporting Student Discussions: It Isn't Talk. Education and Information Technologies, 3:217--229, 1998.
[14]
V. M., R. Govaerts, and J. Vandewalle. How Role Based Access Control is implemented in SESAME. In IEEE 6th WETICE, 1997.
[15]
J. Mayes. Learning Technology and Groundhog Day. In W. Strang, V. Simpson, and D. E. Slater, editors, Proceedings of Hypermedia at Work: Practice and Theory in Higher Education. University of Kent at Canterbury, 1995.
[16]
J. T. Mayes and I. Neilson. Learning from other people's dialogues: questions about computer-based answers. In B. B. Collis and G. Davies, editors, Innovative Adult Learning with Innovative Technologies, volume 1, pages 31--47. Elsevier Science B. V., Amsterdam, 1995.
[17]
T. Mayes and F. Dineen. Developing Tertiary Courseware through capturing Task Directed Discussions. In Proceedings of ED-MEDIA, Seattle, USA, 1999.
[18]
J. McKendree, K. Stenning, T. Mayes, J. Lee, and R. Cox. Why observing a dialogue may benefit learning. Journal of Computer Assisted Learning, 14:110--119, 1998.
[19]
R. Monthienvichienchai and M. A. Sasse. Learning from Others' Mistakes Through Computer Supported Vicarious Learning. In Proceedings of the 4th LTSN Conference, Galway, Ireland, August 2003.
[20]
J. Newman, T. Mayes, D. Benyon, S. Draper, P. Gray, A. Kilgour, and L. Mackinnon. Lessons from a Multi-university Remote Tutoring Community --- MANTCHI. In Proceedings of the 3rd International Conference on the Role of Universities in the Future Information Society: The Virtual University. Flagstaff, Arizona, 1999.
[21]
R. Sandhu, D. Ferraiolo, and R. Kuhn. The NIST model for role-based access control: towards a unified standard. In Proceedings of the fifth ACM workshop on Role-based access control, pages 47--63, 2000.
[22]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role Based Access Control Models. IEEE Computer, 29(2):38--47, 1996.
[23]
K. Stenning, J. McKendree, J. Lee, R. Cox, F. Dineen, and T. Mayes. Vicarious Learning from Educational Dialogue. In C. Hoadley and J. Roschelle, editors, Proceedings of Computer Support for Co-operative Learning: Designing New Media for a New Millenium, pages 341--347, Stanford University, Palo Alto, CA, December 1999.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '04: Proceedings of the 2004 ACM symposium on Applied computing
March 2004
1733 pages
ISBN:1581138121
DOI:10.1145/967900
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 March 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. OASIS
  2. policy
  3. role-based access control

Qualifiers

  • Article

Conference

SAC04
Sponsor:
SAC04: The 2004 ACM Symposium on Applied Computing
March 14 - 17, 2004
Nicosia, Cyprus

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media