Search results for "Credential"

showing 5 items of 5 documents

Critical stance within a community of inquiry in an advanced mathematics course for pre-service teachers

2020

AbstractThis paper reports a study of university students’ experiences of learning mathematics in an introductory differential equations course that takes an inquiry approach to learning and teaching. The students are on a trajectory leading toward a bachelor’s degree in mathematics to be followed by a year-long teacher education credential program. The analysis of students’ end of course presentations and written portfolios is framed with community of practice theory, complemented with analytic categories from community of inquiry, including notions of inquiry stance and critical alignment. Our social theorization of university mathematics education adds a complementary perspective to the …

General Mathematicsmedia_common.quotation_subject010102 general mathematics05 social sciencesPerspective (graphical)050301 educationCommunity of inquiryBachelorVDP::Matematikk og Naturvitenskap: 400::Matematikk: 41001 natural sciencesCredentialTeacher educationEducationCommunity of practiceAgency (sociology)ComputingMilieux_COMPUTERSANDEDUCATIONMathematics education0101 mathematicsPhilosophy of education0503 educationmedia_commonJournal of Mathematics Teacher Education
researchProduct

A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control

2006

Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for Multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an access control mechanism that joins the benefits of Credential Based Access Control, Role Based Access Control and Mandatory Access Control. Authorizations and access control policies are set by XML based policy files. A case study on a distributed document retrieval system is also illus…

National securityComputer access controlbusiness.industryComputer scienceMulti-agent systemAuthorizationData securityAccess controlComputer securitycomputer.software_genreCredentialMandatory access controlDiscretionary access controlRole-based access controlbusinesscomputer
researchProduct

Diploma Devaluation, The Ins and Outs

2017

International audience

Overeducation[SHS.EDU]Humanities and Social Sciences/Education[SHS.EDU] Humanities and Social Sciences/Education0502 economics and business05 social sciences050602 political science & public administration050301 education[ SHS.EDU ] Humanities and Social Sciences/Education050207 economicsCredential inflation0503 educationComputingMilieux_MISCELLANEOUS0506 political science
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment

2017

Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health systems is of paramount importance. As a way of achieving this requirement, more emphasis has been given to anonymous attribute credentials, which allows a user to anonymously prove the ownership of a set of attributes to a verifier and thereby gain access to protected resources. Among the existin…

Scheme (programming language)business.industryProperty (programming)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreCredentialHealth dataSet (abstract data type)020204 information systemsHealth care0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYThe Internetbusinesscomputercomputer.programming_language2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)
researchProduct