메뉴 건너뛰기




Volumn 23, Issue 16, 2011, Pages 2034-2042

Access control and authorization for protecting disseminative information in E-learning workflow

Author keywords

access control; E learning; workflow

Indexed keywords

E-LEARNING; WORK SIMPLIFICATION;

EID: 80053507368     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.1748     Document Type: Conference Paper
Times cited : (10)

References (30)
  • 2
    • 84869797804 scopus 로고    scopus 로고
    • Technical Report, education.au limited, Available at
    • White G,. The changing landsacpe: E-learning in schools. Technical Report, education.au limited, 2003. Available at: http://admin.edna.edu.au/ dspace/bitstream/2150/54787/1/changing-landscape-gw.pdf.
    • (2003) The Changing Landsacpe: E-learning in Schools
    • White, G.1
  • 3
    • 57349107131 scopus 로고    scopus 로고
    • Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems
    • ACM: New York, NY, U.S.A.
    • Chen J, Yang Y,. Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems. ICSE '08: Proceedings of the 30th International Conference on Software Engineering. ACM: New York, NY, U.S.A., 2008; 141-150.
    • (2008) ICSE '08: Proceedings of the 30th International Conference on Software Engineering , pp. 141-150
    • Chen, J.1    Yang, Y.2
  • 9
    • 77955304363 scopus 로고    scopus 로고
    • Temporal dependency based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems
    • Available at
    • Chen J, Yang Y,. Temporal dependency based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems. ACM Transactions on Software Engineering and Methodology 2009. Available at: http://www.swinflow.org/papers/TOSEM.pdf.
    • (2009) ACM Transactions on Software Engineering and Methodology
    • Chen, J.1    Yang, Y.2
  • 12
  • 14
    • 80053511852 scopus 로고    scopus 로고
    • Addison Wesley: Reading, MA.
    • Brad C,. Superdistribution. Addison Wesley: Reading, MA, 1996.
    • (1996) Superdistribution
    • Brad, C.1
  • 15
    • 41549113938 scopus 로고    scopus 로고
    • Copyright? protection?, the mathematics of information coding, extraction, and distribution
    • Cynthia D,. Copyright? protection?, the mathematics of information coding, extraction, and distribution. The IMA Volumes in Mathematics and its Applications 1999; 107: 31-47.
    • (1999) The IMA Volumes in Mathematics and Its Applications , vol.107 , pp. 31-47
    • Cynthia, D.1
  • 17
    • 20344392161 scopus 로고    scopus 로고
    • Understanding motivations for internet use in distance education
    • DOI 10.1109/TE.2004.842904
    • Stafford TF,. Understanding motivations for internet use in distance education. IEEE Transactions on Education 2005; 48 (2): 301-306. (Pubitemid 40784515)
    • (2005) IEEE Transactions on Education , vol.48 , Issue.2 , pp. 301-306
    • Stafford, T.F.1
  • 23
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private Internet connections
    • Goldschlag D, Reed M, Syverson P,. Onion routing for anonymous and private Internet connections. Communications of the ACM 1999; 24 (2): 39-41.
    • (1999) Communications of the ACM , vol.24 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.