LEARNER CENTRIC IN M-LEARNING: INTEGRATION OF SECURITY, DEPENDABILITY AND TRUST

The paper focus on learner centric attributes in a m - learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature survey is conducted and analyst to produce a new classification and definition. The paper introduces new definition, concepts and classification model integrating security and dependability for a learner centric security model and evaluation to assess the confidence and satisfaction level of learners.

[1]  Young-Koo Lee,et al.  A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[2]  John McLean,et al.  Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Chuang Lin,et al.  Model-Driven Dependability Analysis of Virtualization Systems , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.

[4]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[5]  G. Buja,et al.  Conceptual frameworks for dependability and safety of a system , 2006, International Symposium on Power Electronics, Electrical Drives, Automation and Motion, 2006. SPEEDAM 2006..

[6]  Erland Jonsson,et al.  Towards an integrated conceptual model of security and dependability , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[7]  John E. Dobson,et al.  On the Trustworthiness of Computing Systems , 1990 .

[8]  Jörg Henkel,et al.  Dependability and Security Will Change Embedded Computing , 2008, Computer.

[9]  P. S. Tasker,et al.  DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .

[10]  Nicholas Kyriakopoulos,et al.  A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability , 2009, IEEE Communications Surveys & Tutorials.

[11]  Jiankun Hu,et al.  Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy , 2011, J. Netw. Comput. Appl..

[12]  Brian Randell,et al.  Fundamental Concepts of Dependability , 2000 .

[13]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[14]  Catherine A. Meadows,et al.  Applying the dependability paradigm to computer security , 1995, Proceedings of 1995 New Security Paradigms Workshop.

[15]  Karin Sallhammar,et al.  Stochastic Models for Combined Security and Dependability Evaluation , 2007 .

[16]  George Spanoudakis Monitoring Security and Dependability in Mobile P2P Systems , 2008 .

[17]  Hermann Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992 .

[18]  Jean-Claude Laprie,et al.  Dependable computing: concepts, limits, challenges , 1995 .

[19]  Deep Medhi,et al.  Dependability and security models , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[20]  Reijo Savola,et al.  Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry , 2007, International Conference on Software Engineering Advances (ICSEA 2007).