References

 < Day Day Up > 



Advanced Distributed Learning. Retrieved March 3, 2003 from the World Wide Web: http://www.adlnet.org

Alliance of Remote Instructional Authoring and Distribution Networks for Europe. Retrieved March 3, 2003 from the World Wide Web: http:/ /www.ariadne-eu.org

Aviation Industry CBT Committee. Retrieved March 3, 2002 from the World Wide Web: http://aicc.org

Back, A., Goldberg, I., & Shostack, A. (2001, May). Freedom 2.1. Security issues and analysis.

Bellotti, V., & Sellen, A. (1993). Designing for privacy in ubiquitous computing environments. In Proceedings of European Conference on Computer- Supported Cooperative Work, ECSCW ‘93. Milan, Italy.

Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In Proceedings of the 17th IEEE Symposium on Security and Privacy (pp. 164–173), IEEE Computer Society.

Blaze, M., Feigenbaum, J., Ioannidis, J., & Keromytis, A. D. (1999). The KeyNote Trust-Management System Version 2, Request For Comments (RFC) 2704. Retrieved February 22, 2002 from the World Wide Web: http://www.ietf.org/rfc/rfc2704.txt?number=2704

Borking, J. J., Eck, B. M. A., & Siepel, P. (1999). Intelligent software agents and privacy. Registratiekamer, The Hague, Achtergrondstudies en Verkenningen 13.

Boucher, P., Shostack, A., & Goldberg, I. (2000). Freedom Systems 2.0.

Chaum, D. (1981). Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM, 24(2), 84–88.

Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communication of the ACM, 28(10), 1030–1044.

Chaum, D., & Evertse, J. (1986). A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology—CRYPTO’86, LNCS 0263 (pp. 118–167). Heidelberg: Springer-Verlag.

Chen, L. (1995). Access with pseudonyms. In E. Dawson, & J. Golic (Eds.), Cryptography: Policy and algorithms—Lecture Notes in Computer Science (Vol. 1029) (pp. 232–243). Heidelberg: Springer-Verlag.

Chu, Y. (1997). REFEREE: Trust management for Web applications. Retrieved April 1, 2002 from the World Wide Web: http://www.w3.org/PICS/TrustMgt/presentation/97-04-08-referee-www6/

Cranor, L. F., Reagle, J., & Ackerman, M. S. (1999). Beyond concern: Understanding net users’ attitudes about online privacy. AT&T Labs—Research Technical Report TR 99.4.3; http://www.research.att.com/library/trs/TRs/99/99.4/

Cristea, A. I., & Okamoto, T. (2000). Student model-based, agent-managed, adaptive distance learning environment for academic English teaching. In Proceedings, International Workshop on Advanced Learning Technologies (IWALT 2000).

CSA 1 Canadian Standards Association Ten Privacy Principles. Available at http://www.csa.ca/standards/privacy/code/Default.asp?language=English

Dai, W. (2000). Pipenet 1.1. Available at http://www.eskimo.com/~weidai/pipenet.txt

Damianou, N., Dulay, N., Lupu, E., & Sloman, M. (2001). The Ponder Specification Language. Workshop on Policies for Distributed Systems and Networks (Policy2001). HP Labs Bristol.

Department of Justice. Privacy provisions highlights. Retrieved April 4, 2002 from the World Wide Web: http://canada.justice.gc.ca/en/news/nr/1998/attback2.html

Dey, A. K., & Abowd, G. D. (2000). Towards a better understanding of context and context-awareness. CHI 2000, Workshop on the What, Who, Where and How of Context Awareness. ftp://ftp.cc.gatech.edu/pub/gvu/tr/1999/99-22.pdf

Dulay, N., Lupu, E., Sloman, M., & Damianou, N. (2001). A policy deployment model for the Ponder Language. An extended version of the paper in Proceedings of the IEEE/IFIP International Symposium on Integrated Network Management (IM 2001). Seattle. IEEE Press.

El-Khatib, K., Korba, L., Xu, Y., & Yee, G. (2003). Privacy and security in e-learning. International Journal of Distance Education Technologies, 1(4), October–December.

Ellison, C., & Schneier, B. (2000). Ten risks of PKI: What you’re not being told about Public Key Infrastructure. Computer Security Journal, XVI(1).

Fogg, B. J., Marable, L., Stanford, J., & Tauber, E. R. (2002). How do people evaluate a web site’s credibility? Results from a large study. Consumer Webwatch News. Retrieved from the World Wide Web: http://www.consumerwebwatch.org/news/report3_credibilityresearch/stanfordPTL_TOC.htm

Fraser, J. H., Holt, P., & Mackintosh, J. (2000). Health issues in human– computer interactions in electronic learning environments. EdMedia2000 Conference, Montreal, Quebec.

Freedman, M. J., & Morris, R. (2002, November). Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the ninth ACM Conference on Computer and Communications Security (CCS’02) (pp. 193–206).

Friedman, B., Thomas, J. C., Grudin, J., Nass, C., Nissenbaum, H., Schlager, M., & Schneiderman, B. (1999). Trust me, I’m accountable: Trust and accountability online. In CHI’99 Extended Abstracts on Human Factors in Computer Systems, Panel Session (pp. 79–80). New York: ACM Press.

Goldschlag, D., Reed, M., & Syverson, P. (1999). Onion Routing for anonymous and private Internet connections. Communications of the ACM, 42(2), 39–41.

Goldschlag, D., Reed, M., & Syverson, P. (1996). Hiding routing information. In R. Anderson (Ed.), Information hiding: First International Workshop, LNCS 1174 (pp. 137–150). Heidelberg: Springer-Verlag.

Grandison, T., & Sloman, M. (2000). A survey of trust in Internet applications. IEEE Communications Surveys, Fourth Quarter 2000; http://www.comsoc.org/livepubs/surveys/public/2000/dec/grandison.html

Hiltz, S. R., & Turoff, M. (1985). Structuring computer-mediated communication systems to avoid information overload. Communications of the ACM, 28(7), July.

Hodgins, H. W. (2000). Into the future: A vision paper, Commission on Technology & Adult Learning. Retrieved April 1, 2002 from the World Wide Web: http://www.learnativity.com/download/MP7.PDF

Holt, P., & Fraser, J. (2003). Anxiety and design issues for e-learning. In Proceedings of Ed-Media 2003, Honolulu, Hawaii.

Holt, P., Abaza, M., Brehaut, W., Lin, O., Jelica, G., Stauffer, K., Leung, S., Shata, O., & Wang, H. (2001). Towards a multimedia distributed learning environment. In Proceedings of the Seventh International Conference on Distributed Multimedia Systems (DMS 01) (pp. 32–41).

IEEE Learning Technology Standards Committee (LTSC). Retrieved March 3, 2002 from the World Wide Web: http://ltsc.ieee.org/index.html

IEEE LTSC. (2001). IEEE P1484.1/D9 Draft standard for learning technology—Learning technology systems architecture (LTSA). Retrieved March 3, 2002 from the World Wide Web: http://ltsc.ieee.org/doc/wg1/IEEE_1484_01_D09_LTSA.pdf

IEEE P1484.2. (2000). Retrieved March 3, 2002 from the World Wide Web: http://ltsc.ieee.org/wg2/papi_learner_07_main.pdf

IMS Global Learning Consortium. (2001). Final specification of IMS Learner Information Package Information Model, Version 1.0. Retrieved March 3, 2002 from the World Wide Web: http://imsproject.org

IMS Global Learning Consortium. March 3, 2002: http://imsproject.org

Korba, L. (2002). Privacy in distributed electronic commerce. Proceedings of the 35th Hawaii International Conference on System Science (HICSS), Hawaii.

Korba, L., Song, R., & Yee, G. (2002). Anonymous communications for mobile agents. In Proceedings of the Fourth International Workshop on Mobile Agents for Telecommunication Applications (MATA’02), LNCS 2521 (pp. 171–181). Barcelona, Spain. Oct. 2002. NRC 44948.

Koyama, A., Barolli, L., Tsuda, A., & Cheng, Z. (2001). An agent-based personalized distance learning system. In Proceedings, 15th International Conference on Information Networking.

Kudo, M., & Hada, S. (2000). XML document security based on provisional authorization. In Seventh ACM Conference on Computer and Communication Security (CCS 2000).

Langheinrich, M. (2001). Privacy by design—Principles of privacy-aware ubiquitous systems. In Proceedings of Ubicomp 2001 (pp. 273–291).

Lee, J., Kim, J., & Moon, J. Y. (2000). What makes Internet users visit cyber stores again? Key design factors for customer loyalty. Proceedings of CHI ‘2000 (pp. 305–312). The Hague, Amsterdam.

Lieberman, H. (2002). Interfaces that give and take advice. In J. M. Carroll (Ed.), Human–computer interaction in the new millennium. New York: ACM Press.

Lysyanskaya, A., Rivest, R., & Sahai, A. (1999). Pseudonym systems. Selected areas in cryptography: Sixth Annual International Workshop, SAC’99, LNCS 1758 (pp. 184–200). Heidelberg: Springer- Verlag.

An Open Specification for Pretty Good Privacy. Retrieved January 22, 2002 from the World Wide Web: http://www.ietf.org/html.charters/openpgp-charter.html

Patrick, A. S. (2002). Building trustworthy software agents. IEEE Internet Computing, 6(6), 46–53.

Patrick, A. S., & Kenny, S. (2003). From privacy legislation to interface design: Implementing information privacy in human-computer interfaces. Proceedings of Privacy Enhancing Technologies Workshop (PET2003), Dresden, Germany, March 26-28. LNCS 2760. NRC 45787.

Privacy Technology Review. Retrieved March 3, 2003 from the World Wide Web: http://www.health-canada.ca/ohih-bsi/available/tech/tech_e.html

Public-Key Infrastructure. Retrieved January 22, 2002 from the World Wide Web: http://www.ietf.org/html.charters/pkix-harter.html

P3P: The Platform for Privacy Preferences Project. (2001). In S. Garfinkel, & G. Spafford (Eds.), Web security, privacy & commerce (2nd ed.) (pp. 699–707). Sebastopol, CA: O’Reilly & Associates, Inc.

Raymond, J. (2000). Traffic analysis: Protocols, attacks, design issues, and open problems. In H. Federrath (Ed.), Anonymity 2000, Volume 2009 of Lecture Notes in Computer Science (pp. 10–29). Heidelberg: Springer- Verlag.

Resnick, P., & Miller, J. (1996). PICS: Internet access controls without censorship. Communications of the ACM, 39, 87–93.

Rosi , M., Stankov, S., & Glavini , V. (2002). Application of Semantic Web and personal agents in distance education system. In Proceedings, IEEE MELECON 2002, May 7–9, Cairo, Egypt.

Rotter, J. B. (1980). Interpersonal trust, trustworthiness, and gullibility. American Psychologist, 35(1), 1–7.

Samuels, R., & Hawco, E. (2000). Untraceable Nym Creation on the Freedom 2.0 Network. Zero-Knowledge Systems Inc., white paper.

Santos, J. M., & Rodriguez, J. S. (2002). Towards an agent architecture to provide knowledge-based facilities for distance education. Proceedings, 24th Int. Conf. Information Technology Interfaces (ITI2002), June 24–27. Cavtat, Croatia.

Simon, D. R. (1996). Anonymous communication and anonymous cash. In Advances in cryptology—CRYPTO ’96, LNCS 1109 (pp. 61–73). Heidelberg: Springer-Verlag.

Song, R., & Korba, L. (2002). Review of network-based approaches for privacy. Proceedings of the 14tthAnnual Canadian Information Technology Security Symposium, Ottawa, Canada, May. NRC 44905.

Thumlert, K. (1997). Hypertextuality and sociocultural contexts for education. Retrieved April 3, 2003 from the World Wide Web: http://home1.gte.net/grnjeans/htext.htm

Xu, Y., & Korba, L. (2002). A trust model for distributed e-learning service control. In Proceeding of the World Conference on E-Learning in Corporate, Government, Healthcare & Higher Education (E- Learn2002), Montreal, Canada, Oct. 15–19.

Yee, G., & Korba, L. (2003). The negotiation of privacy policies in distance education. Proceedings, 14th IRMA International Conference, Philadelphia, Pennsylvania, May 18–21. NRC Paper Number: NRC 44985.

Yee, G., & Korba, L. (2003-1). Bilateral e-services negotiation under uncertainty. Proceedings, 2003 Symposium on Applications and the Internet (Saint 2003), Orlando, Florida, January 27–31. NRC Paper Number: NRC 44964.



 < Day Day Up > 



Designing Distributed Environments with Intelligent Software Agents
Designing Distributed Learning Environments with Intelligent Software Agents
ISBN: 1591405009
EAN: 2147483647
Year: 2003
Pages: 121

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net