Confidentiality and privacy ensures that no one
other than the sender and the designated recipients
can read the data. XML Encryption as specified in
the W3C Recommendation (Eastlake, 2002) and the
Web Services Security recommendation for
encryption in SOAP messages (Hartman, 2002)
provide confidentiality.
Integrity of the sequence of the data assists in
avoiding any gaps occurring in the transactions and
in strengthening the performance of the system.
This requirement is implementation specific and can
be fulfilled by enforcing a tight sequence issuance
scheme for the reference number embedded in each
action.
Availability ensures that the students can use the
e-learning service at any time without disruption.
On one hand, the system should be robust and
protected against intrusion and hacking, which can
be ensured by standard network elements such as
intrusion detection systems, antivirus and firewalls.
On the other hand, some form of public directory
usage for publishing the offered services will foster
services dissemination.
Electronic Storage of files. The conditions for
electronic storage of e-files e-objects and the
technical requirements of the electronic storage
system are integral components of the security
requirements concerning e-learning. Authenticity,
integrity and readability should be guaranteed
throughout the storage period. A native XML
database can ensure that XML files/objects are
stored exactly in the original format in which they
were received for the correct creation of the
students’ model or any future audit. Furthermore, the
combination of XAdES and such a database can
guarantee the secure long-term archiving of e-
learning data.
Secure Sections. Secure sections allow temporary
replacement of the current security execution
context, so that the enclosed code executes on behalf
of the new principal. The new context remains in
scope within the section and propagates between
virtual machines, if necessary. For example, if a
remote client with limited rights invokes a simple
database query service, it may not have the required
privileges to perform the query. If the query was
executed on behalf of a second (intermediate) user
with sufficient privileges, the client could then
retrieve the necessary result set without having been
explicitly granted the necessary permissions. These
new rights or privileges only remain in effect inside
the scope of the secure section.
Privilege Delegation. Privilege delegation occurs
when a calling entity authorizes an intermediate
entity to perform a task using a set of the rights
granted to the calling entity. For delegation, the
underlying security mechanisms must be notified
that a boundary has been crossed, that the calling
entity (principal) is no longer in scope. This occurs
only when entering a secure section.
3 OPERATION OF THE SYSTEM
Web F-SMILE (File-Store Manipulation Intelligent
Learning Environment) is an intelligent learning
environment for novice users of a GUI (Graphical
User Interface) that manipulates files. It works in a
similar way as Windows 98/NT Explorer (Microsoft
Corporation, 1998) but additionally it can
dynamically adapt its interaction to individual
learners for helping and tutoring them. For this
purpose, Web F-SMILE silently observes the
students while they are actively engaged in their
usual activities for their file manipulation. If Web F-
SMILE judges that a student has been involved in a
problematic situation (as indicated by the user
modelling component) it provides individualised
advice and tutoring at its own initiative.
The system can work both as a Web-based
application and as a standalone application when the
learner’s computer is not connected to the Internet.
The system keeps two copies of user models, one on
the Server and one on the user’s PC so that the
system may work both online and offline. When the
system works online, information about the learner
is stored on a User modelling Server and is given to
any client of the application that requests it. When
the system works offline information about the
learner is stored on the PC. Web F-SMILE uses Web
Services for the interaction of the components of the
system with the Web Server.
A simple example of the system’s operation
taken from a real interaction of a user with Web F-
SMILE is presented in Table 1. The learner's initial
file store state of the floppy disk is illustrated in
figure 1. The learner’s final intention is to format the
floppy disk A. However, the floppy disk contains a
folder with some lecture notes which apparently are
useful. Therefore, the learner wants to move this
folder to a safe place (the hard disk of his/her
computer).
In order to achieve his/her goal the user issues a
cut command (action 1) in order to move the folder
‘lecture notes’. However, it appears that the learner
does not know how to complete this plan because in
the second action, s/he falsely uses a ‘copy’
command instead of a ‘paste’ command. Web F-
COMPLETENESS, SECURITY AND PRIVACY IN USER MODELLING FOR WEB-BASED LEARNING
295