Exploiting Policies in an Open Infrastructure for Lifelong Learning

  • Juri L. De Coi
  • Philipp Kärger
  • Arne W. Koesling
  • Daniel Olmedilla
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4753)

Abstract

Nowadays, people are in need for continuous learning in order to keep up to date or be upgraded in their job. An infrastructure for lifelong learning requires continuous adaptation to learners needs and must also provide flexible ways for students to use and personalize them. Controlling who can access a document, specifying when a student may be contacted for interactive instant messaging or periodical reminders in order to increase motivation for collaboration are just some examples of typical statements that may be specified by e.g., learners and learning management system administrators. This paper shows how policies can represent a way of expressing these statements and describes the extra benefits of its adoption like flexibility, dynamicity and interoperability.

Keywords

Policy lifelong learning agent negotiation access control 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, A.H.: An introduction to the web services policy language (wspl). In: POLICY 2004. Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, p. 189. IEEE Computer Society, Washington, DC, USA (2004)Google Scholar
  2. 2.
    Bonatti, P.A., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: POLICY 2005. 6th IEEE International Workshop on Policies for Distributed Systems and Networks, Stockholm, Sweden, pp. 14–23. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  3. 3.
    Bonatti, P.A., Olmedilla, D., Peer, J.: Advanced policy explanations on the web. In: Piero, A. (ed.) ECAI 2006. 17th European Conference on Artificial Intelligence, Riva del Garda, Italy, pp. 200–204. IOS Press, Amsterdam (2006)Google Scholar
  4. 4.
    Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–38. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Duma, C., Herzog, A., Shahmehri, N.: Privacy in the semantic web: What policy languages have to offer. In: POLICY 2007. 8th IEEE International Workshop on Policies for Distributed Systems and Networks, Bologna, Italy, IEEE Computer Society, Los Alamitos (2007)Google Scholar
  6. 6.
    El-Khatib, Korba, Xu, Yee: Privacy and security in e-learning. International Journal of Distance Education (2003)Google Scholar
  7. 7.
    Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K.E., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol. 3053, pp. 342–356. Springer, Heidelberg (2004)Google Scholar
  8. 8.
    Hatala, M., Eap, T.M.T., Shah, A.: Unlocking repositories: Federated security solution for attribute and policy based access to repositories via web services. In: ARES 2006. Proceedings of the First International Conference on Availability, Reliability and Security, pp. 895–903. IEEE Computer Society, Washington, DC, USA (2006)Google Scholar
  9. 9.
    Kagal, L., Finin, T.W., Joshi, A.: A policy language for a pervasive computing environment. In: POLICY 2003. 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy, p. 63. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  10. 10.
    The lionshare project, http://lionshare.its.psu.edu/
  11. 11.
    Nabeth, T., Roda, C., Angehrn, A.A., Mittal, P.K.: Using artificial agents to stimulate participation in virtual communities. In: IADIS International Conference CELDA (Cognition and Exploratory Learning in Digital Age) (2005)Google Scholar
  12. 12.
    Nejdl, W., Wolf, B., Qu, C., Decker, S., Sintek, M., Naeve, A., Nilsson, M., Palmer, M., Risch, T., Edutella, A.: P2P networking infrastructure based on RDF. In: WWW 2002. 11th International World Wide Web Conference, Hawaii, USA (June 2002)Google Scholar
  13. 13.
    OASIS eXtensible Access Control Markup Language, http://www.oasis-open.org/specs/index.php#xacmlv2.0
  14. 14.
    TENCompetence: building the european network for lifelong competence development. http://www.tencompetence.org/
  15. 15.
    Uszok, A., Bradshaw, J.M., Jeffers, R., Suri, N., Hayes, P.J., Breedy, M.R., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: POLICY 2003. 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy, p. 93. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  16. 16.
    Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, IEEE Press, Los Alamitos (2000)Google Scholar
  17. 17.
    Yang, Lin, Lin: Policy-based privacy and security management for collaborative e-education systems. In: 5th IASTED Multi-Conference Computers and Advanced Technology in Education, Cancun, Mexico (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Juri L. De Coi
    • 1
  • Philipp Kärger
    • 1
  • Arne W. Koesling
    • 1
  • Daniel Olmedilla
    • 1
  1. 1.L3S Research Center and Leibniz University of Hannover, HannoverGermany

Personalised recommendations