kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure E-learning using the Holistic and Immune Security Framework
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
2009 (English)In: The 4th International Conference for Internet Technology and Secured Transactions, 2009, p. 189-196Conference paper, Published paper (Refereed)
Abstract [en]

This paper describes how to secure e-learning systems by applying the Holistic and Immune Security Framework. E-learning has great potential for developing communities but security of e-learning systems has not been fully addressed. We have developed a security framework that considers culture of users and environments where information systems operate. We apply the holistic approach to secure e-learning systems. The holistic and immune security framework is a function of the deterrence, prevention, detection, response, and recovery system. The security framework makes an E-learning system learn to adapt to environments and to culture of users. We apply the principles of immune system to secure E-learning systems. We describe how to secure the weak links that are created by culture of users in E-leaning systems.

Place, publisher, year, edition, pages
2009. p. 189-196
Keywords [en]
Developing communities, Immune systems, Recovery systems, Security frameworks, Weak links
National Category
Information Systems
Identifiers
URN: urn:nbn:se:kth:diva-34515DOI: 10.1109/icitst.2009.5402508Scopus ID: 2-s2.0-77950310438ISBN: 978-142445648-2 (print)OAI: oai:DiVA.org:kth-34515DiVA, id: diva2:421782
Conference
International Conference for Internet Technology and Secured Transactions, ICITST 2009; London; United Kingdom; 9 November 2009 through 12 November 2009
Note

QC 20110609

Available from: 2011-06-09 Created: 2011-06-09 Last updated: 2022-06-24Bibliographically approved

Open Access in DiVA

fulltext(160 kB)499 downloads
File information
File name FULLTEXT01.pdfFile size 160 kBChecksum SHA-512
7cb37f0ea3280d3973f0489ae65ad4454618c985e3650c748764b9fb5b0cce4c7754d3ec8edd1e57413c5e4689295eb480d70330ba7c35477bc79bd594a9ec12
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Mwakalinga, JeffyKowalski, StewartYngström, Louise
By organisation
Computer and Systems Sciences, DSV
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 499 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 260 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf