Vous êtes sur la page 1sur 10

Introduction

eCX: a secure Online education becomes one of the most


infrastructure for important channels for students to acquire
e-course delivery knowledge and learning material. Currently,
there are about three types of courses provided
Joe C.K. Yau through this education medium:
Lucas C.K. Hui (1) short courses without formal qualifications;
(2) diploma, degree or even higher degree
Bruce Cheung and
courses with formal qualifications; and
S.M. Yiu (3) courses which help students to take public
examinations or to get a formal degree such
as an external London University degree.
The authors
Although many projects and researches have
Joe C.K. Yau is a Software Engineer, Lucas C.K. Hui is
been conducted on online distance learning, the
Associate Professor and S.M. Yiu is a Teaching Consultant,
issues of security have only been studied
all at the Department of Computer Science and Information
recently (Cheung et al., 1999a; Cheung and
Systems, The University of Hong Kong, Hong Kong.
Hui, 1999; Furnell et al., 1998, 1999).
Bruce Cheung is a Lecturer at the School of Professional
and Continuing Education, The University of Hong Kong,
In fact, there are quite a number of security
Hong Kong. concerns in this type of education system, for
example, user authentication and access control,
non-repudiation for critical actions like course
Keywords
registration, course tuition fee payment,
Security, Copyright, Applications software, confidentiality of user personal information,
Learning organizations, Distance learning, Online computing course material copyright protection, etc. For
more information on what security issues an
Abstract online learning system may consider, one can
Online education has emerged as one of the major channels refer to the security framework given by Furnell
for dissemination of learning materials. As more and more et al. (1998); and for more information on the
organizations offer online distance learning courses, the problem of user authentication and access
security concerns of these online education systems become control, one can refer to Cheung et al. (1999a)
more and more critical, especially when the organizations and Cheung and Hui (1999). In particular,
rely on the registration fees of students to maintain the Cheung et al. (1999) provides a security model
smooth running of the courses. Provides a mechanism, the such that a legitimately registered student cannot
Secure e-Course eXchange (eCX), to protect the learning easily share the account with non-registered
material from unauthorized dissemination, and shows how students.
this mechanism can be integrated in the operation model of Depending on the type of courses offered by
online learning course providers. The design of eCX is an organization, the security concerns may
general enough to fit two operating models, namely the differ slightly. There is one security problem,
Institutional Server Model and the Corporate Server Model.
the copyright protection problem, which is
important to all kinds of e-courses, especially
Electronic access
for type (1) and (3) courses mentioned above.
The Emerald Research Register for this journal is available at Typical scenarios include the following:
http://www.emeraldinsight.com/researchregister registered students infringing the copyrights of
The current issue and full text archive of this journal is the course materials by passing the materials to
available at non-registered students. Usually, the
http://www.emeraldinsight.com/1066-2243.htm organization providing the course materials
depends on the registration fee to maintain the
Internet Research: Electronic Networking Applications and Policy operation of the organization. This copyright
Volume 13 . Number 2 . 2003 . pp. 116-125
# MCB UP Limited . ISSN 1066-2243 infringement severely jeopardizes the income of
DOI 10.1108/10662240310469060 the organization.
116
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

Some argue that, for courses that lead to the public. The number of students registered
formal qualifications, as long as students are with HKU SPACE programmes is more than
required to pay for writing the examinations, 70,000 and the figure is expected to go up at a
freely distributing the course materials should tremendous rate. In order to provide effective
not be a matter. They argue that even without support for online distance learning, the SOUL
protecting the copyrights of the materials, the Project Group was established in 1998. The
income of the organization could still be aim of the project is to provide online support
secured via examination fees. However, this for educational purposes; to develop HKU
only fits type (2) courses mentioned above SPACE online support courses in both Hong
which is a very narrowed model within the Kong and Mainland China; and to carry out
online education trend. Moreover, the trend of researches related to online learning. The
online education is that there will be SOUL platform is the major product of the
organizations holding examinations and Project Group. As of October 2002, more than
granting students the qualifications, while other 21,000 students and teachers are using the
organizations may be producing the course platform. For more information about the
materials to assist students in learning the SOUL system, please refer to (SOUL, 2002).
materials and preparing them for the The rest of the paper is organized as follows:
examinations. In such cases, this ``charge-by- the ``Background'' section briefly describes the
examination'' model would not be appropriate, copyright protection problem. The core
and the copyrights of the course materials still technologies used in eCX will be given in ``The
have to be protected. secure e-Course eXchange (eCX)'' section. The
The copyright protection problem for ``Operations of eCX'' section will discuss the
e-Course material has been receiving little operations of eCX. In the ``Trusting hierarchy
attention. A good framework for online and operating models of e-institutes'' section,
education has been given in Furnell et al. we will discuss how eCX could be applied to
(1998), but the security issue for protecting the two different online education operating
copyright of the course materials has not been models. Finally, we will provide some
addressed. Not long ago, another paper Furnell concluding remarks in the last section.
et al. (1999) has studied the problem, but the
discussion is brief. In particular, it does not
provide an effective approach for copyright Background
protection and copyright detection in the
domain of online education. In this paper, we Although digital copyright protection in the
give a design, the Secure e-Course eXchange domain of the online learning system is a rather
(eCX), on how to make the process of copying new subject, there have been studies on this
``extremely difficult'' for users so as to protect problem in other domains. (For examples,
the copyright of the materials disseminated please refer to Brin et al., 1995; Dittmann and
through an e-Course. More importantly, we Nack, 2000; Memon and Wong, 1998.) The
also demonstrate how this design can be security concerning copyright is basically
incorporated in the operation model of online divided into two major topics: copyright
learning course providers. The design can fit detection and copyright protection. Interested
into two operating models, namely the readers can refer to (Wayner, 1997) for more
Institutional Server Model and the Corporate information.
Server Model. Copyright detection makes it easier to
This study of copyright protection for e- discover the activities of unauthorized copying
Course material is conducted by the SPACE or dissemination of the copyrighted materials.
Online Universal Learning (SOUL) Project Copyright detection techniques can be used
Group of the School of Professional and identify the owner of the copyrighted material,
Continuing Education of the University of and, hence, to track down copyright violators
Hong Kong (HKU SPACE). HKU SPACE is who illegally disseminate the material. One
one of the leading adult education providers in major technique used for copyright detection
Hong Kong. It provides life-long learning for on multimedia data is watermarking (Johnson
117
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

et al., 2001; Katzenbeisser et al., 2000). While network connection of students, who are
watermarking is quite useful in imaging data, ordinary home users, is yet to meet the
the applicability of the technique in text-based demanding requirements for delivering material
materials is not straightforward. Also, for of media types other than text or simple
material that is expected to have a wide graphical images, for example, video clips or
distribution (i.e. there are many legal users to audio clips. Therefore, we propose a solution
the material), keeping tracking of all legal copies whereby the students are allowed to download
of the material becomes infeasible. In the the course material on to their own computer,
domain of online distance learning, most course and be able to view the material offline. This
materials are text-based, and the distribution is extra requirement makes the copyright
expected to be wide. Hence, protecting the protection problem much more difficult and
copyright by means of copyright detection does challenging.
not seem to be an effective approach. In this paper, we will propose a copyright
On the other hand, copyright protection tries protection solution for the e-education domain,
to make unauthorized copying of materials the ecure e-Course eXchange (eCX). We will
difficult or ``impossible''. Existing techniques show how eCX integrates copyright protection
(Furnell et al., 1999; Wayner, 1997) include the techniques applied in other domains, as well as
following: users cannot obtain a permanent encryption techniques to make copyright
copy of the materials and must access the protection for e-Course material possible. We
materials using a ``secure'' and proprietary
will also show how eCX allows students to
browser. That is, users have to stay online while
retain a complete copy of the course material
using the materials. This approach creates some
while making it difficult to create or disseminate
inconvenience to the users. Another approach is
copies of the material to other unauthorized
to couple the access rights to the material
users. As a remark, due to the nature of the
(possibly a piece of data or software) with a
digital data, none of the existing approaches can
hardware configuration of the entitled
provide perfect security regarding these
computer. The material itself may be encrypted
copyright problems, and it is very unlikely that
where the encryption key would be dependent
such methods exist. However, as long as it is
on the configuration of the legitimate computer.
difficult for students to pass the materials to
In this case, even if the materials have been
other unauthorized users, most of the students
illegally passed on to another user or computer,
the illegal copy will not function properly. will register for the courses and obtain the
These approaches of copyright protection have material in a proper manner.
been used in some e-book systems and software
such as the product activation technique used in
Microsoft Windows XP (Microsoft, 2002). The secure e-Course eXchange (eCX)
For our study of the copyright protection
problem, we have extra design requirements, The secure e-Course eXchange (eCX) is a set
which make our problem no easier, if not more of software modules designed to work together
difficult, to solve. First, after some research on to protect the copyright of e-Course material.
the existing network facilities, we discovered These modules are shattered among various
that it is expensive for students to remain components in PowerEdBuilder ± the
online. This means that, if the course material architecture for the SOUL platform. Before
must be viewed online, it will increase the giving a detailed discussion on eCX, we will
financial burden of the students and will make give a brief description on PowerEdBuilder.
e-courses not as attractive. Second, requiring Figure 1 depicts a system overview of
students to stay online means that students will PowerEdBuilder.
not be able to study when making network As PowerEdBuilder is designed to be used by
connection is not possible. For example, using a three different parties, namely instructors,
notebook computer to study while the student institutes and students, there are three software
is away from home for a business trip would not components specifically designed for them.
be possible. Third, the bandwidth of the They are the Content Engineering System, the
118
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

Figure 1 System overview of PowerEdBuilder

e-Institute, and the e-Learning Platform other components of PowerEdBuilder,


respectively. please refer to (Yau et al., 2002a; Cheung et al.,
The Content Engineering System (CES) is 2002a, b). Please also refer to our conference
designed for instructors to create e-Course papers (Yau et al., 2002b, c) for discussions on
materials and to launch e-Courses. There is an various development stages of eCX.
eCX sub-module, called the Course Launcher, At the core of eCX, there are two important
residing in CES which is used for launching technologies designed specifically for this
e-Courses. The e-Institute is the administration copyright protection system. They are the
center of the platform. It is used for handling Offline-Online Course and the Computer
student registration, course registration, course License.
payment, as well as course materials hosting
and downloading. The e-Learning Platform is The offline-online course
the client software installed on the students' As discussed above in the ``Background''
computers. It consists of two software section, we believe that allowing students to
components: the Personal Classroom and the download e-Course material and view them
Course Downloader. The Personal Classroom offline is beneficial to the students. The Offline-
is the software which students use for viewing Online Course is a proprietary technology
the course material. At the core of the Personal designed specifically to make this possible.
Classroom is the SmartTutor, which is an Ordinary e-Course implementation requires
intelligent tutoring system built with artificial students to view the course material online, and
intelligent technology, used for assisting the material is stored in the server hosting the
students in their learning process and to provide course. On the contrary, the Offline-Online
guidance to students like a human tutor. The Course permits students to download the
Course Downloader is used for assisting course material to their own computers and
students in downloading e-Courses. It uses a view the material offline, while making it
proprietary protocol to communicate with the difficult to perform unauthorized copying.
e-Institute for registering and downloading Basically, an instructor will compose
e-Courses. Besides these three major e-Course materials using the Content
components, PowerEdBuilder also has a Engineering System. When the preparation is
Communication and Searching Infrastructure done, the instructor can make use of the Course
(CSI) providing efficient and secure Launcher, one of the eCX modules situated at
communication channels among instructors, the CES, to launch the newly created e-Course
institutes, and students. Lastly, the Secure to an affiliated e-Institute server (please see the
e-Course eXchange (eCX) provides ``Course Launching'' section for more details).
infrastructure for protecting the copyrighted The launching process will create two objects
materials. In this paper, we will only focus on based on the e-Course material. They are the
the eCX related modules. For details about the Course Package and the Course Voucher. The
119
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

Course Package contains the online material, Platform software on to his/her computer.
and is encrypted by some symmetrical During the installation, a PKI key-pair is
encryption algorithm. The Course Voucher generated. A hardware profile recording the
contains different information about the course. hardware configuration of the student's
Most importantly, it contains the encryption computer is also generated. The public key of
key for decrypting the Course Package. This the key-pair and this hardware profile are both
implies that, for viewing the course material, stored inside the Computer License. Besides,
one must possess both the Course Package and some personal information about the student is
the Course Voucher for the course. Once the also stored in this Computer License. This
e-Course is successfully launched, the Course makes Computer License unique to each
Package will be distributed over the network computer. This Computer License is then sent
and could be downloaded by students. to the e-Institute server, which the student has
To take an available e-Course, students have affiliation with. The e-Institute server will
to register for it (please see the ``Course verify this Computer License, assign to it an
Registration'' section for details). Students can expiry date, and sign it digitally. The server
download the Course Package, and they must will send the signed Computer License back to
also obtain the Course Voucher from the the student's computer. Note that in order to
e-Institute server in order to view the course keep information confidential, the
material. Please note that students are charged communication between the server and the
for obtaining the Course Voucher, but not student's computer is done over some secure
charged for downloading the Course Package. communication channel (e.g. the Secure
The whole process of obtaining the Course Socket Layer ± SSL).
Package and the Course Voucher, as well as the When a student invokes the Personal
payment process are all handled by the Course Classroom software of the e-Learning Platform
Downloader software of the e-Learning for viewing the course material, the Computer
Platform. License will first be examined and check if
The design of eCX applies PKI technology ± this invocation is valid. The invocation is valid
Public Key Infrastructure (Stallings, 1999) to only if:
tighten its security. As will be discussed below, . the Computer License is properly signed by
in the next section, all students possess a PKI an e-Institute server;
key-pair. When the Course Voucher is . the Computer License has not expired; and
delivered from the e-Institute server to the . the software is invoked on the computer on
student, the Course Voucher will be encrypted which it was originally installed.
using the student's public key, which can only
be decrypted using the student's private key. While the first two conditions are trivial, the
When this encrypted Course Voucher is third condition requires some elaboration.
received by the student, it will be stored During the invocation, a hardware profile will
securely on the student's computer in this be generated to reflect the current hardware
encrypted form, which can only be accessed by configuration of the computer. This hardware
the Personal Classroom of the e-Learning profile is compared with the hardware profile
Platform. When the student possesses both the stored in the Computer License. The third
Course Package and the Course Voucher, he/ condition will only be satisfied if the two
she can make use of the Personal Classroom hardware profiles match.
for viewing the e-Course material offline. The When a student has registered for an
next subsection will show why the offline e-Course, both the Course Package and the
material obtained cannot be easily transferred Course Voucher will be under the student's
to others. possession. As mentioned above, the Course
Package is protected by some symmetric
Computer License encryption. Since the encryption key to the
The Computer License is a special object that Course Package is contained in the Course
resides in the student's computer. It is created Voucher, the Course Voucher must also be
when the student installs the e-Learning protected on the student's computer. When
120
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

the Course Voucher is received from the e-Institute server for renewal. By keeping track
e-Institute, it is encrypted with the computer's of students' Computer Licenses, the institute
public key using some asymmetric will make sure that there is only one valid
cryptographic algorithm, such as RSA Computer License for each student. In a case
(Stallings, 1999). This public key is in fact the where a student cheats and request for re-
one stored in the Computer License. After this issuing Computer License, or the student's
encrypted Course Voucher is received from the private key is compromised, the old Computer
e-Institute, it will be stored in the student's License would have been revoked and renewal
computer in this encrypted form. Since it is will not be possible.
encrypted with the computer's public key, it can Despite all its advantages, the Computer
only be decrypted by using the computer's License approach does have its own
private key. The private key to this key-pair is disadvantage. If the hardware configuration of
stored in some special location on the the system is changed substantially, the
computer's hard disk. The only time that a Computer License may be made invalid and the
Course Voucher is not encrypted is when the student needs to contact the institute for
student is viewing the course material. Please appropriate action. In our current
refer to the ``Course Viewing'' section for implementation, we have put in some tolerance
more details. in this hardware configuration verification. Our
The Computer License is vital to the design experience has been satisfactory and users'
of eCX. By comparing the computer's hardware feedback is positive.
profile with the one stored on the Computer
License, we can be sure that the Personal
Classroom is invoked on the computer where Operations of eCX
the Computer License was originally issued to,
and the material can only be viewed on this In this section, we will describe the details of the
same computer. It prohibits unauthorized users key operations, such as course launching,
from using illegal copies of the course material. course registration, and course viewing, of eCX.
Some of the other copyright protection systems
are breakable if the software and the protected Course Launching
material are all copied on to another computer, As mentioned above, when an e-Course is
and most will fail if the hard disk is completely launched using the Course Launcher, two
duplicated. However, since eCX employs objects, the Course Package and the Course
Computer License, it would not be vulnerable Voucher, will be created from the e-Course
to these attacks. material. The Course Launcher will send these
Under some unexpected, yet possible two objects through some secure
situations, hard disks of a student's computer may communication channel (e.g. SSL) to the
fail which makes the retrieval of the student's Voucher Administrator, which is a module
Computer License not possible. In that case, the integrated into the e-Institute (see Figure 2).
student would have to contact the institute and Under the Voucher Administrator, the objects
request the re-issuing of a new Computer License. are stored in a database and made available for
Note that this re-issuing of the Computer License students to download.
is totally governed by the institute. Administrative
policy can be applied to limit such re-issuing to Course registration
stop students from cheating. Note, also, that To register for an e-Course, the student has to
when a Computer License is re-issued to a invoke the Course Downloader software of the
student, the old Computer License will be e-Learning Platform (see Figure 2). The
revoked at the same time. Course Downloader will establish a secure
In addition, the Computer License is communication connection with the Voucher
designed to have an expiry date, and the typical Administrator (e.g. SSL) to obtain the Course
lifetime of a Computer License is six months. Voucher. Students are not charged for
Before a Computer License expires, the downloading the Course Package, but are
e-Learning Platform software will contact the charged electronically and automatically for
121
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

Figure 2 A detail diagram of PowerEdBuilder (CSI omitted for simplicity)

obtaining the Course Voucher. The Voucher well protected, these two processes will go
Administrator will validate the student's through a special authentication process to
Computer License sent by the Course mutually authenticate each other.
Downloader and encrypt the voucher with the When this authentication process is done, the
student computer's public key. The encrypted Voucher Store will use the computer's private
Course Voucher will be sent to student's key to decrypt the Course Voucher which was
Course Downloader, then stored in the previously encrypted by the e-Institute server
Voucher Store of the student's machine in its using the computer's public key (please see the
encrypted form. ``Course Registration'' section for details).
Afterwards, the Voucher Store will release the
Course viewing decrypted Course Voucher to the Personal
After registering for an e-Course, the student Classroom where it will be used for decrypting
can use the Personal Classroom software of the the Course Package. Note that for security
e-Learning Platform to view the course reasons and performance reasons, the Personal
material. Just as described in the ``Computer Classroom will decrypt the course material
License'' section, the Personal Classroom will from the Course Package in a material-on-
only proceed if the invocation validation is demand fashion.
successful. Once it is successfully invoked, the
Personal Classroom will obtain the Course
Voucher from the Voucher Store for decrypting
Trusting hierarchy and operating models
the Course Package. Note that, both the
of e-institutes
Personal Classroom and the Voucher Store
processes are executed on the student's The trusting hierarchy
computer. To guarantee the security of the PowerEdBuilder is designed so that many
system, and to ensure the e-Course material is e-Institute servers may exist on the network. A
122
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

possible real life example wouud be for The two server models
different companies to host their own servers The eCX is designed to suit the needs of two
for in-house training programmes. These different operating models. They are the
servers, together with the student computers, Institutional Server Model and the Corporate
form a trusting hierarchy (see Figure 3). Server Model.
Student computers belong to the lowest level The Institutional Server Model is a server
of the hierarchy, which has the least privilege. model that is tailored to be used by educational
They could be authenticated by checking their organizations. All Institutional Servers are
Computer Licenses. The only authority they equipped with a Server Certificate signed by the
have is to digitally sign payment confirmations Root Certificate Authority. They have the
for registering e-Courses. The authority of signing and issuing Computer
e-Institute servers belong to the middle level of License for students registered under them.
the hierarchy. These servers are the Certificate There can be many servers operating under this
Authorities (CA) for issuing Computer model, and each server is authorized to issue
Licenses to student computers. Each of these Computer Licenses. Besides having computer
servers possesses a Server Certificate, which is licenses issued by themselves, these institutional
used for proving its own identity to others. The servers can be configured to honor Computer
eCX Root Certificate Authority is in the Licenses issued by other Institutional Servers.
highest level of the hierarchy. It possesses the However, they will never honor Computer
Root Key to the whole PowerEdBuilder Licenses issued by any Corporate Servers.
trusting hierarchy, and is the root of the An Institutional Server has no limitation as
trusting hierarchy. It signs the Server to the number of ``copies'' of an e-Course that
Certificate of all of the servers in the it can issue to students. The revenue
middle level. generated from the course will be split among

Figure 3 Trusting hierarchy of e-institute servers

123
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

different parties according to the payment Professional and Continuing Education of the
agreement. University of Hong Kong.
The Corporate Server Model is a server As one future direction of research,
model that is tailored to be used by business evaluation on the eCX will be performed
organizations for corporate training. All shortly, and the results will be used in the
Corporate Servers are equipped with a Server refinement of eCX and other PowerEdBuilder
Certificate signed by the Root Certificate components. In fact, there are many other
Authority. They have the authority of signing security issues regarding online learning
and issuing Computer Licenses for students systems, such as online submission of
registered under them (i.e. their own staff). assignments (Luck and Joy, 1999), which are
Servers operating under the Corporate not addressed in this paper. Therefore, other
Server Model function are very much like future research directions would be to tackle
those under the Institutional Server Model ± those security problems.
except for three ways. The first difference is
that a Corporate Server only honors
Computer Licenses issued by itself. It will not
honor any Computer Licenses from any other References
servers, regardless if the license is issued by Brin, S., Davis, J. and Garcia-Molina, H. (1995), ``Copy
another Institutional Server or another detection mechanisms for digital documents'',
Corporate Server. The second difference is SIGMOD 95, pp. 398-409.
that since a Corporate Server is operated Cheung, B. and Hui, L.C.K. (1999), ``Student authentication for
within the same corporation, it can have a a Web-based distance learning system'', Proceedings of
the Fifth International Conference on Information
different mechanism for the payment system.
Systems Analysis and Synthesis, pp. 441-6.
The course registration may be free for all of Cheung, B., Hui, L.C.K., Yim, T. and Yung, V.W.L. (1999),
its staff members, or charging according to ``Security design in an online-education project'',
cost centers, etc. The third difference is that a in e-Education: Challenges and Opportunities.
Corporate Server pays the instructor (i.e. the Proceedings of the Fifth Hong Kong Web Symposium,
e-Course provider) at a bulk rate. The pp. 1-14.
Cheung, B., Hui, L., Zhang, J. and Yiu, S.M. (2002a),
corporate pays the instructor a certain
``SmartTutor: an intelligent tutoring system in Web-
amount of money for a fixed number of copies
based adult education'', Journal of Systems and
of the e-Course, and the server will be limited Software.
to issue that many copies of the Cheung, B., Hui, L.C.K., Yiu, S.M., Lee, J.K.W., Kwok, L.K.
e-Course. In other words, the server can only and Leung, K. (2002b), ``Content engineering agent:
send a limited number of copies of a Course a TBL-based e-course development tool with TQM'',
Voucher to its staff members. International Journal of Distance Education
Technologies.
Dittmann, J. and Nack, F. (2000), ``Copyright ± copywrong'',
IEEE Multimedia, Vol. 7 No. 4, pp. 14-17.
Conclusion Furnell, S. et al. (1998), ``A security framework for online
distance learning and training'', Internet Research:
In this paper, we consider the problem of Electronic Networking Applications and Policy, Vol. 8
copyright protection of online learning material No. 3, pp. 236-42.
Furnell, S. et al. (1999), ``Security considerations in online
in the domain of e-Courses. We propose a
distance learning'', Proceedings of Euromedia 99,
mechanism, called the Secure e-Course pp. 131-5.
eXchange (eCX), which allows students to Johnson, N. et al. (2001), Information Hiding :
store a local copy of the material while making Steganography and Watermarking ± Attacks and
the sharing of the material, with non-registered Countermeasures (Advances in Information Security,
students, difficult. The design of eCX is flexible Volume 1), Kluwer Academic Publishers, Boston, MA.
Katzenbeisser, S. et al. (2000), Information Hiding
to fit two operating models, namely the
Techniques for Steganography and Digital
Institutional Server Model and the Corporate
Watermarking, Artech House, Boston, MA.
Server Model. This design has been Luck, M. and Joy, M. (1999), ``A secure on-line submission
implemented in an actual online learning system'', Software ± Practice and Experience, Vol. 29
system, the SOUL platform, for the School of No. 8, pp. 721-40.
124
eCX: a secure infrastructure for e-course delivery Internet Research: Electronic Networking Applications and Policy
Joe C.K. Yau, Lucas C.K. Hui, Bruce Cheung and S.M. Yiu Volume 13 . Number 2 . 2003 . 116-125

Memon, N. and Wong, P.W. (1998), ``Protecting digital Yau, J.C.K., Hui, L.C.K., Cheung, B.S.N., Yiu, S.M. (2002b),
media content'', Communications of the ACM, Vol. 41 ``An online course material copyright protection
No. 7, pp. 35-43. scheme'', in Conference Proceedings of International
Microsoft (2002), Web site of Microsoft Corporation (2002), Network Conference 2002 (INC2002), July.
available at: www.microsoft.com. Yau, J.C.K., Hui, L.C.K., Cheung, B.S.N., Yiu, S.M., Cheung,
SOUL (2002), Web site of SOUL project (2002), available at:
V.L.S. (2002c), ``A cryptographic schemes in secure
http://soul.hkuspace.org.
e-Course eXchange (eCX) for e-Course workflow'',
Stallings, W. (1999), Cryptography and Network Security:
Principles and Practice, 2nd ed., Prentice-Hall, in Conference Proceedings of SSGRR 2002 (Summer)
Engelwood Cliffs, NJ. International Conference on Advances in Infrastructure
Wayner, P. (1997), Digital Copyright Protection, for e-Business, e-Education, e-Science, and e-Medicine
AP Professional, Boston, MA. on the Internet (SSRGG 2002s), L'Aquila, Italy, 29 July-
Yau, J.C.K., Hui, L.C.K., Cheung, B.S.N., Yiu, S.M. and 4 August.
Lee, J.K.W. (2002a), ``PowerEdBuilder ± a universal
secure e-learning infrastructure'', in Conference
Proceedings of SSGRR 2002 (Winter) International
Conference on Advances in Infrastructure for Further reading
e-Business, e-Education, e-Science, and e-Medicine on
the Internet (SSRGG 2002w), L'Aquila, Italy, 21-27 Harasim, L. (1999), ``A framework for online learning: the
January 2002. virtual-U'', IEEE Computer, pp. 44-9.

125

Vous aimerez peut-être aussi