2019
DOI: 10.1155/2019/9313571
|View full text |Cite
|
Sign up to set email alerts
|

Towards the Construction of a User Unique Authentication Mechanism on LMS Platforms through Model-Driven Engineering (MDE)

Abstract: In LOD, authentication is a key factor in the security dimension of linked data quality models. is is the case of (a) LMS that manages open educational resources (OERs), in training process, and (b) LMS integrated platforms, which also require authenticating users. Authentication tackles a range of problems such as users forgetting passwords and time consumption in repetitive logins in different applications. In the context of linked OERs that are developed in LMS, it is necessary to design guidelines in order… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The recent progress in access control mechanisms is Risk-Adaptive-Access-Control, where the decision for access relies on dynamic assessment. There is a lot of knowledge on this subject in the existing research literature [34][35]. Moreover, risk-oriented access control solutions and authentication processes are considered in the access management policies.…”
Section: ) Risk-based Access Control and Authenticationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The recent progress in access control mechanisms is Risk-Adaptive-Access-Control, where the decision for access relies on dynamic assessment. There is a lot of knowledge on this subject in the existing research literature [34][35]. Moreover, risk-oriented access control solutions and authentication processes are considered in the access management policies.…”
Section: ) Risk-based Access Control and Authenticationsmentioning
confidence: 99%
“…Although it offers security, its security effectiveness is not rigorously assessed with respect to various major threats in the cloud environment. The study of Herrera-Cubides et al [58] introduced a security scheme based on a service-oriented architecture that enables the business system and authentication authority to separate services. Irrespective of the explicit security definition of this model, it still couldn't perceive the dynamics involved in unknown adversary identification and authentication.…”
Section: ) Multi-factor Authenticationmentioning
confidence: 99%
“…Then, SSO is established, and the linked activity/resource page is redirected to the browser. Now, users can access the linked activity/resource without login into Moodle [20].…”
Section: Domestic Lms To Moodlementioning
confidence: 99%