메뉴 건너뛰기




Volumn 48, Issue 1, 2007, Pages 1-16

A PKI approach for deploying modern secure distributed e-learning and m-learning environments

Author keywords

Architectures for educational technology system; Distance education and telelearning; E learning; M learning; Public key infrastructure; Security; Trust

Indexed keywords

COMPUTER NETWORKS; DISTANCE EDUCATION; MATHEMATICAL MODELS; ONLINE SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33748438283     PISSN: 03601315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compedu.2004.10.017     Document Type: Article
Times cited : (30)

References (42)
  • 2
    • 33748432758 scopus 로고    scopus 로고
    • Arseanult, A., & Turner, S. (2002). Internet X.509 Public key infrastructure: Roadmap, PKIX Working Group. IETF Internet Draft. , July 2002.
  • 3
    • 33748428370 scopus 로고    scopus 로고
    • Chadwick, D. (2002). The PERMIS X.509 based privilege management infrastructure. IETF Internet Draft. , April 2002.
  • 4
    • 0004129141 scopus 로고    scopus 로고
    • Experiences of using public key infrastructure for the preparation of examination papers
    • Elsevier Science
    • Chadwick D., Tassabehji R., and Young A. Experiences of using public key infrastructure for the preparation of examination papers. Computers and Education 35 1 (2000) 1-20 Elsevier Science
    • (2000) Computers and Education , vol.35 , Issue.1 , pp. 1-20
    • Chadwick, D.1    Tassabehji, R.2    Young, A.3
  • 5
    • 84887367338 scopus 로고    scopus 로고
    • Chen, Y. S., Kao, T. C., Sheu, J. P., & Chiang, C. Y. (2002). A mobile scaffolding-aid-based bird-watching learning system. In Proceedings of IEEE workshop on wireless and mobile technologies in education, Los Alamitos, USA (pp. 15-22).
  • 7
    • 33748421566 scopus 로고    scopus 로고
    • Diatchenko, J., Miloslavskaya, N., & Tolstoy, A. (2002). Designing secure distance learning system. In Proceedings of The VII international conference on engineering and technology education, Santos, Brazil (pp. 17-20).
  • 8
    • 33748439013 scopus 로고    scopus 로고
    • Dierks, T., & Allen, C. (1999). The TLS protocol version 1.0. IETF RFC 2246, January 1999.
  • 9
    • 33748421809 scopus 로고    scopus 로고
    • Ericsson, A. S. (2004). Mobile learning: the next generation of learning project. Available from http://learning.ericsson.net/mlearning2/.
  • 10
    • 33748418638 scopus 로고    scopus 로고
    • Farrell, S., & Housley, R. (2002). An Internet attribute certificate profile for authorization. IETF RFC 3281.
  • 11
    • 33748424879 scopus 로고    scopus 로고
    • Ferraiolo, D. F., Cugini, J. A., & Kuhn, R. D. (1995). Role-based access control (RBAC): features and motivations. Available from http://hissa.ncsl.nist.gov/rbac/newpaper/rbac.html.
  • 13
    • 33748430719 scopus 로고    scopus 로고
    • Frier, A., Karlton, P., & Kocher, P. (1996). The SSL 3.0 protocol version 3.0. Available from http://home.netscape.com/eng/ssl3/draft302.txt.
  • 15
    • 33748421951 scopus 로고    scopus 로고
    • Furnell, S. M., Bleimann, U., Girsang, J., Roder, H., Sanders, P., & Stengel, I. (1999). Security considerations in online distance learning. In Proceedings of Euromedia, Munich, Germany (pp. 131-135).
  • 17
    • 33748433862 scopus 로고    scopus 로고
    • Graf, F., Busch, C., & Wolthusen, S. (1999). Courseware needs security. In Proceedings of ICCE 1999 international conference on computers in education, Chiba, Japan.
  • 18
    • 33748429632 scopus 로고    scopus 로고
    • Harris, P. (2001). Goin' mobile, ASTD's online magazine all about e-learning. Available from http://www.leamingcircuits.org/2001/jul2001/harris.html.
  • 21
    • 33748423442 scopus 로고    scopus 로고
    • Insite, A. S., Ericsson, A. S., Telenor Mobil, A. S., & It Fornebu Knowation, A. S. (2001). M-learning: experiences from the use of WAP as a supplement in learning, pilot project. Available from http://www.insiteint.com/download/M-learning_wap.pdf.
  • 22
    • 33748425036 scopus 로고    scopus 로고
    • ITU-T Recommendation X.509. (1997). Information technology-open systems interconnection-the directory: authentication framework (equivalent to ISO/IEC 9594-8, 1997).
  • 23
    • 9144229638 scopus 로고    scopus 로고
    • Kambourakis, G., Rouskas, A., & Gritzalis, S. (2004). Experimental analysis of an SSL-based AKA mechanism in 3G-and-beyond wireless networks. In Wireless personal communications (WPC). Special issue on security for next generation communications. Kluwer (prepublication date: 4/2004).
  • 24
    • 33748418216 scopus 로고    scopus 로고
    • Kaufman, C. (2004). Internet key exchange (IKEv2) protocol. , March 2004.
  • 25
    • 33748439299 scopus 로고    scopus 로고
    • Kent, S., & Atkinson, R. (1998). Security architecture for the Internet protocol. RFC 2401, November 1998.
  • 26
    • 0034843868 scopus 로고    scopus 로고
    • Korhonen, J., Aalto, O., Gurtov, A., & Laamanen, H. (2001). Measured performance of GSM HSCSD and GPRS. In Proceedings of the IEEE international conference on communications (ICC '01), Helsinki, Finland.
  • 27
    • 2942676762 scopus 로고    scopus 로고
    • Luchini, K., Curtis, M., Quintana, C., & Soloway, E. (2002). Supporting learning in context: extending learner-centered design to the development of handheld educational software. In Proceedings of IEEE international workshop on wireless and mobile technologies in education, Los Alamitos, USA (pp. 107-111).
  • 29
    • 33748434656 scopus 로고    scopus 로고
    • Mirkovic, J., Martin, J., & Reiher, A. (2002). A taxonomy of DDoS attacks and DDoS defense mechanisms. UCLA CSD Technical Report No. 020018. Electronically available from http://www.lasr.cs.ucla.edu/ddos/ucla_tech_report_020018.pdf.
  • 30
    • 33748414947 scopus 로고    scopus 로고
    • Myers, M. et al. (1999). X.509 Internet public key infrastructure online certificate status protocol-OCSP. IETF RFC 2560.
  • 33
    • 33748438592 scopus 로고    scopus 로고
    • Oppliger, R., Pernul, G., & Strauss, C. (2000). Using attribute certificates to implement role based authorization and access control models. In Proceedings of the 4 Fachtagung Sicherheit in information systemen (SIS2000), Zurich, Switzerland (pp. 169-184).
  • 34
    • 33748434512 scopus 로고    scopus 로고
    • Otenko, S., & Chadwick, D. (2003). A comparison of the Akenti and PERMIS authorization infrastructures, version 2.1, July 2003. Electronically available from http://esc.isi.salford.ac.uk/download/AkentiPERMISDeskcomparison2-1.pdf.
  • 35
    • 33748421565 scopus 로고    scopus 로고
    • PKIX Working Group, 2004. Public-key infrastructure (X.509) (pkix), Last Modified: 2004-09-07. Electronically available from http://www.ietf.org/html.charters/pkix-charter.html.
  • 37
    • 0037667389 scopus 로고    scopus 로고
    • The design of personal mobile technologies for lifelong learning
    • Sharples M. The design of personal mobile technologies for lifelong learning. Computers and Education 34 (2000) 177-193
    • (2000) Computers and Education , vol.34 , pp. 177-193
    • Sharples, M.1
  • 38
    • 0033279783 scopus 로고    scopus 로고
    • Smith, J., Mohan, R., & Li, C. (1999). Scalable multimedia delivery for pervasive computing, ACM Multimedia. Available from www.ee.columbia.edu/~jrsmith/htm/pubs/acmmm99.pdf.
  • 39
    • 85084164318 scopus 로고    scopus 로고
    • Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., & Essiari, A. (1999). Certificate-based access control for widely distributed resources. In Proceedings of the 8th USENIX security symposium, Washington, DC.
  • 41
    • 33748429216 scopus 로고    scopus 로고
    • VeriSign. (2002). Enterprise key management, white paper 005308, September 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.