Abstract
This paper introduces a novel middleware framework designed to enhance interoperability and manage access rights within diverse educational ecosystems. Our approach leverages a hierarchically structured role and authorization management system to facilitate seamless integration across various educational platforms and content providers. By focusing on the central administration of authorizations, the framework ensures coherent educational journeys for users, enabling user-specific enrollments in educational programs, sovereign data management, and flexible adaptation to dynamic educational needs. We discuss the conceptual underpinnings of our system, including rights-as-a-graph and contextual hierarchy-based rights, and detail its practical applications through case studies. These include facilitating distributive education programs, ensuring data sovereignty for learning analytics, and supporting self-sovereign access model configurations. Our system addresses the critical need for a flexible, context-dependent rights management solution that can adapt to the evolving landscape of educational technologies and standards. Through a detailed examination of related works and by providing practical application scenarios, this paper contributes to the field of educational technology by offering a scalable, interoperable solution designed to support lifelong learning in an ever-changing world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Goulding, T.: What you need to know about NIST 800-53, least privilege, and PAM (2023). https://delinea.com/blog/nist-800-53-security-privacy-privileged-access
Bertino, E.: RBAC models—concepts and trends. Comput. Secur. 22(6), 511–514 (2003). https://doi.org/10.1016/S0167-4048(03)00609-6
Yuan, E., Tong, J.: Attributed based access control (ABAC) for Web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS'05), Orlando, FL, USA, p. 569 (2005). https://doi.org/10.1109/ICWS.2005.25
Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: Proceedings of the Third ACM Workshop on Role-Based Access Control (1998)
Lindqvist, H.: Mandatory access control. Master’s thesis, Department of Computing Science, Umeå University, SE-901 87 (2006)
Ausanka-Crues, R.: Methods for access control: advances and limitations. In: Harvey Mudd College Reports, No. 301, p. 20 (2001)
Wang, W.: “Team-and-role-based organizational context and access control for cooperative hypermedia environments”. In: Proceedings of the Tenth ACM Conference on Hypertext and Hypermedia: Returning to Our Diverse Roots, 1999
Alves, S., Fernández, M.: A graph-based framework for the analysis of access control policies. Theor. Comput. Sci. 685, 3–22 (2017)
Burke, D., et al.: Best of breed strategies–hospital characteristics associated with organizational HIT strategy. J. Healthc. Inf. Manag. JHIM 23(2), 46–51 (2009)
1EdTech: “Application Profile Guidelines Overview” (2023). https://www.imsglobal.org/ap/apv1p0/imsap_oviewv1p0.html#1672351
1EdTech: “IMS Global Learning Consortium - Common Cartridge” (2023). https://www.imsglobal.org/activity/common-cartridge
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Nguyen, TA., An, TS., Krauss, C. (2024). A Middleware for Educational Ecosystems – Rights and Access-Control Management by Design. In: Uden, L., Liberona, D. (eds) Learning Technology for Education Challenges. LTEC 2024. Communications in Computer and Information Science, vol 2082. Springer, Cham. https://doi.org/10.1007/978-3-031-61678-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-61678-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61677-8
Online ISBN: 978-3-031-61678-5
eBook Packages: Computer ScienceComputer Science (R0)