![]() |
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() ![]() ![]() ![]() ![]() |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Home | Research | Research Programs | Security and Privacy |
Security and PrivacyE-learning Infrastructure for Mobile Virtual University
Researchers from NRC-IIT and Tamkang University (Taiwan) are working together on E-learning Infrastructure for Mobile Virtual University, a three-year NRC – National Sciences Council (Taiwan) collaborative project that began in April 2002. The project aims to research and develop an infrastructure to support mobile and distributed e-learning that provides security, privacy, authentication, mobile identity management and new communication tools for cooperative and interactive learning. While NRC-IIT researchers’ focus on several aspects related to security for electronic delivery of education in general, they will build proof-of-concept demonstrations of the technology for the Mobile Virtual University Software System. More specifically, NRC-IIT researchers are working on the integration of authentication, policy-based management of security, and privacy: AuthenticationIn the administration of online courseware, maintaining and managing the identity of every system user is of critical importance. As such, researchers seek to develop a technique that provides secure authentication, without the complexity of traditional approaches. Security ManagementThis work focuses on developing a policy-based approach for managing security and on developing techniques and the architecture for managing overall security for access to online, distributed education systems. PrivacyA large amount of information about individuals may be collected as they use online services. And the major concern for online users when using online services is the privacy of their interactions over the network. This work builds on and extends other research in developing confidential networking approaches, such as in PISA and in e-manufacturing, to include automatic negotiation of privacy policies in the transfer of data to services, and record keeping to offer proof of privacy agreements being upheld. Research results are expected to have an impact on computer supported education applications. OpportunitiesWhile this research pertains to education applications, other applications for the technologies include e-Business, computer supported collaborative work and other interactive or online services. The technology research results, including software components, system prototype and research documents can be transferred to interested organizations to form novel services. If you would like more detailed information about this project, please feel free to contact us. Research ContactLarry Korba Business ContactDr. George Forester |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|