The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January-March (2008 vol.1)
pp: 88-102
Juri Luca De Coi , University of Hannover, Hannover
Philipp Kärger , University of Hannover, Hannover
Arne Wolf Koesling , University of Hannover, Hannover
Daniel Olmedilla , University of Hannover, Hannover
ABSTRACT
Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires continuous adaptation to learners' needs and must also provide flexible ways for students to use and personalize them. Controlling who can access a document, specifying when a student may be contacted for interactive instant messaging or periodical reminders in order to increase motivation for collaboration are just some examples of typical statements that may be specified by e.g., learners and learning management system administrators. This paper investigates how existing work in the area of policy representation and reasoning can be used in order to express these statements while at the same time obtaining the extra benefits policies provide (e.g., flexibility, dynamicity and interoperability). The paper analyzes existing policy languages and integrates one of them as part of a demonstration of its feasibility in providing more advanced and flexible eLearning environments.
INDEX TERMS
General, Miscellaneous, eLearning, policies, life-long learning
CITATION
Juri Luca De Coi, Philipp Kärger, Arne Wolf Koesling, Daniel Olmedilla, "Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning", IEEE Transactions on Learning Technologies, vol.1, no. 1, pp. 88-102, January-March 2008, doi:10.1109/TLT.2008.11
REFERENCES
[1] A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott, “Kaos Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement,” Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03), p. 93, 2003.
[2] R. Gavriloaie, W. Nejdl, D. Olmedilla, K.E. Seamons, and M. Winslett, “No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web,” Proc. First European Semantic Web Symp. (ESWS '04), vol. 3053, pp. 342-356, May 2004.
[3] N. Damianou, N. Dulay, E. Lupu, and M. Sloman, “The Ponder Policy Specification Language,” Proc. Int'l Workshop Policies forDistributed Systems and Networks (POLICY '01), pp. 18-38, 2001.
[4] P. Bonatti and D. Olmedilla, “Driving and Monitoring Provisional Trust Negotiation with Metapolicies,” Proc. Sixth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '05), pp. 14-23, 2005.
[5] L. Kagal, T.W. Finin, and A. Joshi, “A Policy Language for a Pervasive Computing Environment,” Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03), p. 63, June 2003.
[6] A.H. Anderson, “An Introduction to the Web Services Policy Language (WSPL),” Proc. Fifth IEEE Int'l Workshop Policies forDistributed Systems and Networks (POLICY '04), p. 189, 2004.
[7] OASIS eXtensible Access Control Markup Language, http://www.oasis-open.org/specsindex.php\#xacmlv2.0 .
[8] J.L.D. Coi, P. Kärger, A.W. Koesling, and D. Olmedilla, “Exploiting Policies in an Open Infrastructure for Lifelong Learning,” Proc. Second European Conf. Technology Enhanced Learning (EC-TEL '07), vol. 4753, pp. 26-40, Sept. 2007.
[9] W. Nejdl, B. Wolf, C. Qu, S. Decker, M. Sintek, A. Naeve, M. Nilsson, M. Palmer, and T. Risch, Edutella: A P2P Networking Infrastructure Based on RDF, citeseer.ist.psu.eduboris01edutella.html , 2001.
[10] The Lionshare Project, http:/lionshare.its.psu.edu/, 2008.
[11] T. Nabeth, A.A. Angehrn, P.K. Mittal, and C. Roda, “Using Artificial Agents to Stimulate Participation in Virtual Communities,” Proc. IADIS Int'l Conf. Cognition and Exploratory Learning in Digital Age (CELDA '05), Kinshuk, D.G. Sampson, and P.T. Isaas, eds., pp. 391-394, http://dblp.uni-trier.de/db/conf/iadiscelda2005.html#NabethAMR05 , 2005.
[12] F. Abel, E. Herder, P. Kärger, D. Olmedilla, and W. Siberski, “Exploiting Preference Queries for Searching Learning Resources,” Proc. Second European Conf. Technology Enhanced Learning (EC-TEL '07), vol. 4753, pp. 143-157, Sept. 2007.
[13] P.A. Bonatti, D. Olmedilla, and J. Peer, “Advanced Policy Explanations on the Web,” Proc. 17th European Conf. Artificial Intelligence (ECAI '06), pp. 200-204, Aug./Sept. 2006.
[14] P. Bonatti and P. Samarati, “Regulating Service Access and Information Release on the Web,” Proc. Seventh ACM Conf. Computer and Comm. Security (CCS '00), pp. 134-143, 2000.
[15] W. Winsborough, K. Seamons, and V. Jones, “Automated Trust Negotiation,” Technical Report TR-2000-05, DARPA, citeseer. ist.psu.edu/articlewinsborough00automated.html , 2000.
[16] J.S. Brown and P. Duguid, “Adaptive and Intelligent Web-Based Educational Systems,” Int'l J. Artificial Intelligence in Education, vol. 13, pp. 156-169, 2003.
[17] T. Yu, M. Winslett, and K.E. Seamons, “Interoperable Strategies in Automated Trust Negotiation,” Proc. Eighth ACM Conf. Computer and Comm. Security (CCS '01), pp. 146-155, 2001.
[18] C. Duma, A. Herzog, and N. Shahmehri, “Privacy in the Semantic Web: What Policy Languages Have to Offer,” Proc. Eighth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07), pp. 109-118, 2007.
[19] J.W. Lloyd, Foundations of Logic Programming. Springer-Verlag, 1984.
[20] P.A. Bonatti and P. Samarati, “Regulating Service Access and Information Release on the Web,” Proc. Seventh ACM Conf. Computer and Comm. Security (CCS '00), pp. 134-143, 2000.
[21] J.L.D. Coi, E. Ioannou, A. Koesling, and D. Olmedilla, “Access Control for Sharing Semantic Data across Desktops,” Proc. First Int'l Workshop Privacy Enforcement and Accountability with Semantics (PEAS '07), Nov. 2007.
[22] M. Hatala, T.M. Eap, and A. Shah, “Unlocking Repositories: Federated Security Solution for Attribute and Policy Based Access to Repositories via Web Services,” Proc. First Int'l Conf. Availability, Reliability and Security (ARES '06), pp. 895-903, 2006.
[23] K. El-Khatib, L. Korba, Y. Xu, and G. Yee, “Privacy and Security in E-Learning,” Int'l J. Distance Education, vol. 1, no. 4, 2003.
[24] Y. Lin and Lin, “Policy-Based Privacy and Security Management for Collaborative E-Education Systems,” Proc. Fifth IASTED Multi-Conf. Computers and Advanced Technology in Education (CATE), 2002.
[25] PRIME: Privacy and Identity Management for Europe, https:/www.prime-project.eu, 2008.
[26] SeLeNe: Self eLearning Networks, https:/www.prime-project.eu, 2008.
[27] G. Papamarkos, A. Poulovassilis, and P.T. Wood, Eca Rule Languages for Active Self e-Learning Networks, seLeNe Project Deliverable 4.4, 2003.
[28] A.W. Koesling, E. Herder, and D. Krause, “Flexible Adaptivity in AEHS Using Policies,” Proc. Conf. Adaptive Hypermedia and Adaptive Web-Based Systems (AH '08), July 2008.
[29] Moodle: Moodle Open Source eLearning System, http:/moodle.org/, 2008.
[30] ILIAS: Ilias Open Source eLearning System, http:/www.ilias.de/, 2008.
[31] AHA!: Adaptive Hypermedia for All, http:/aha.win.tue.nl/, 2008.
32 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool