This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
January-March 2008 (vol. 1 no. 1)
pp. 1-2

[1] A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott, “Kaos Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement,” Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03), p. 93, 2003.
[2] R. Gavriloaie, W. Nejdl, D. Olmedilla, K.E. Seamons, and M. Winslett, “No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web,” Proc. First European Semantic Web Symp. (ESWS '04), vol. 3053, pp. 342-356, May 2004.
[3] N. Damianou, N. Dulay, E. Lupu, and M. Sloman, “The Ponder Policy Specification Language,” Proc. Int'l Workshop Policies for Distributed Systems and Networks (POLICY '01), pp. 18-38, 2001.
[4] P. Bonatti and D. Olmedilla, “Driving and Monitoring Provisional Trust Negotiation with Metapolicies,” Proc. Sixth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '05), pp. 14-23, 2005.
[5] L. Kagal, T.W. Finin, and A. Joshi, “A Policy Language for a Pervasive Computing Environment,” Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03), p. 63, June 2003.
[6] A.H. Anderson, “An Introduction to the Web Services Policy Language (WSPL),” Proc. Fifth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '04), p. 189, 2004.
[7] OASIS eXtensible Access Control Markup Language, http://www.oasis-open.org/specsindex.php\#xacmlv2.0 .
[8] J.L.D. Coi, P. Kärger, A.W. Koesling, and D. Olmedilla, “Exploiting Policies in an Open Infrastructure for Lifelong Learning,” Proc. Second European Conf. Technology Enhanced Learning (EC-TEL '07), vol. 4753, pp. 26-40, Sept. 2007.
[9] W. Nejdl, B. Wolf, C. Qu, S. Decker, M. Sintek, A. Naeve, M. Nilsson, M. Palmer, and T. Risch, Edutella: A P2P Networking Infrastructure Based on RDF, citeseer.ist.psu.eduboris01edutella.html , 2001.
[10] The Lionshare Project, http:/lionshare.its.psu.edu/, 2008.
[11] T. Nabeth, A.A. Angehrn, P.K. Mittal, and C. Roda, “Using Artificial Agents to Stimulate Participation in Virtual Communities,” Proc. IADIS Int'l Conf. Cognition and Exploratory Learning in Digital Age (CELDA '05), Kinshuk, D.G. Sampson, and P.T. Isaas, eds., pp. 391-394, http://dblp.uni-trier.de/db/conf/iadis celda2005.html#NabethAMR05, 2005.
[12] F. Abel, E. Herder, P. Kärger, D. Olmedilla, and W. Siberski, “Exploiting Preference Queries for Searching Learning Resources,” Proc. Second European Conf. Technology Enhanced Learning (EC-TEL '07), vol. 4753, pp. 143-157, Sept. 2007.
[13] P.A. Bonatti, D. Olmedilla, and J. Peer, “Advanced Policy Explanations on the Web,” Proc. 17th European Conf. Artificial Intelligence (ECAI '06), pp. 200-204, Aug./Sept. 2006.
[14] P. Bonatti and P. Samarati, “Regulating Service Access and Information Release on the Web,” Proc. Seventh ACM Conf. Computer and Comm. Security (CCS '00), pp. 134-143, 2000.
[15] W. Winsborough, K. Seamons, and V. Jones, “Automated Trust Negotiation,” Technical Report TR-2000-05, DARPA, citeseer. ist.psu.edu/articlewinsborough00automated.html , 2000.
[16] J.S. Brown and P. Duguid, “Adaptive and Intelligent Web-Based Educational Systems,” Int'l J. Artificial Intelligence in Education, vol. 13, pp. 156-169, 2003.
[17] T. Yu, M. Winslett, and K.E. Seamons, “Interoperable Strategies in Automated Trust Negotiation,” Proc. Eighth ACM Conf. Computer and Comm. Security (CCS '01), pp. 146-155, 2001.
[18] C. Duma, A. Herzog, and N. Shahmehri, “Privacy in the Semantic Web: What Policy Languages Have to Offer,” Proc. Eighth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07), pp. 109-118, 2007.
[19] J.W. Lloyd, Foundations of Logic Programming. Springer-Verlag, 1984.
[20] P.A. Bonatti and P. Samarati, “Regulating Service Access and Information Release on the Web,” Proc. Seventh ACM Conf. Computer and Comm. Security (CCS '00), pp. 134-143, 2000.
[21] J.L.D. Coi, E. Ioannou, A. Koesling, and D. Olmedilla, “Access Control for Sharing Semantic Data across Desktops,” Proc. First Int'l Workshop Privacy Enforcement and Accountability with Semantics (PEAS '07), Nov. 2007.
[22] M. Hatala, T.M. Eap, and A. Shah, “Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services,” Proc. First Int'l Conf. Availability, Reliability and Security (ARES '06), pp. 895-903, 2006.
[23] K. El-Khatib, L. Korba, Y. Xu, and G. Yee, “Privacy and Security in E-Learning,” Int'l J. Distance Education, vol. 1, no. 4, 2003.
[24] Y. Lin and Lin, “Policy-Based Privacy and Security Management for Collaborative E-Education Systems,” Proc. Fifth IASTED Multi-Conf. Computers and Advanced Technology in Education (CATE), 2002.
[25] PRIME: Privacy and Identity Management for Europe, https:/www.prime-project.eu, 2008.
[26] SeLeNe: Self eLearning Networks, https:/www.prime-project.eu, 2008.
[27] G. Papamarkos, A. Poulovassilis, and P.T. Wood, Eca Rule Languages for Active Self e-Learning Networks, seLeNe Project Deliverable 4.4, 2003.
[28] A.W. Koesling, E. Herder, and D. Krause, “Flexible Adaptivity in AEHS Using Policies,” Proc. Conf. Adaptive Hypermedia and Adaptive Web-Based Systems (AH '08), July 2008.
[29] Moodle: Moodle Open Source eLearning System, http:/moodle.org/, 2008.
[30] ILIAS: Ilias Open Source eLearning System, http:/www.ilias.de/, 2008.
[31] AHA!: Adaptive Hypermedia for All, http:/aha.win.tue.nl/, 2008.

Citation:
Steven Tanimoto, "Welcome Message," IEEE Transactions on Learning Technologies, vol. 1, no. 1, pp. 1-2, Jan.-March 2008, doi:10.1109/TLT.2008.17
Usage of this product signifies your acceptance of the Terms of Use.