{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:41:54Z","timestamp":1729665714916,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isda.2015.7489244","type":"proceedings-article","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T22:22:17Z","timestamp":1465856537000},"page":"307-312","source":"Crossref","is-referenced-by-count":0,"title":["Towards a secure access control model for E-learning platform based on multi agent systems"],"prefix":"10.1109","author":[{"given":"Kassid","family":"Asmaa","sequence":"first","affiliation":[]},{"given":"Elkamoun","family":"Najib","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133067"},{"key":"ref11","article-title":"Security and Privacy in m-Learning and Beyond: Challenges and stae-of-the-art","volume":"6","author":"kambourakis","year":"2013","journal-title":"International Journal of U-and E-Service Science and Technology"},{"key":"ref12","first-page":"83","article-title":"E-Learning systems and their Security","volume":"2","author":"hasan","year":"2014","journal-title":"BRIS Journal of Adv S & T (ISSN 0971&#x2013;9563)"},{"key":"ref13","first-page":"4835","article-title":"A survey of security in multi-agent systems, Expert Systems with Applications","volume":"39","author":"carneiro cavalcante","year":"2012","journal-title":"An International Journal"},{"article-title":"Why E-Learning is So Effective","year":"2013","author":"kuhlmann","key":"ref14"},{"key":"ref15","article-title":"The KeyNote Trust Management System Version 2","author":"blaze","year":"1999","journal-title":"Internet Society Network Working Group RFC 2704"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36388-2_6"},{"key":"ref18","article-title":"RT: A Role-based Trust Management Framework","author":"li","year":"2003","journal-title":"Proceedings of the 3rd DARPA Information Survivability Conference and Exposition"},{"key":"ref19","first-page":"107","article-title":"History-based Access Control for Mobile Code","author":"abadi","year":"2003","journal-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium"},{"key":"ref4","first-page":"437","article-title":"Protection","author":"lampson","year":"1971","journal-title":"5th Princeton Symposium on Information Sciences and Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCCCS.2014.7107922"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref5","article-title":"Secure computer systems: Unified exposition and multics interpretation","author":"bellet","year":"1976","journal-title":"Technical Report ESD TR73&#x2013;306 The MITRE Corporation Mars"},{"key":"ref8","first-page":"13","article-title":"TMAC: A primitive for Applying RBAC in collaborative environment","author":"thomas","year":"1997","journal-title":"2nd ACM Workshop on RBAC"},{"key":"ref7","first-page":"166","article-title":"Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management","author":"thomaset","year":"1997","journal-title":"11th IFIP Working Conference on Database Security"},{"key":"ref2","article-title":"Modern Tools and Technologies for Interactive Learning","author":"bokhari","year":"2011","journal-title":"Proceedings of the Computing For Nation Development Bharati Vidyapeeth's Institute of Computer Applications and Management"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.5120\/7098-9826","article-title":"A New Approach to Multi Agent Based Architecture for Secure and Effective E-learning","volume":"46","author":"ahmad","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2010.63"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288102"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2008.37"}],"event":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2015,12,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484413\/7489153\/07489244.pdf?arnumber=7489244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T16:03:08Z","timestamp":1718640188000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7489244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isda.2015.7489244","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}