It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

WiMAX Security Issues in E-learning Systems | Alecu | Journal of Mobile, Embedded and Distributed Systems

WiMAX Security Issues in E-learning Systems

Felician Alecu, Paul Pocatilu, Sergiu Capisizu

Abstract


WiMAX (Worldwide Interoperability for Microwave Access) is a point-to-multipoint wireless network based on IEEE 802.16 standard. The WiMAX signal is broadcasted from a base station to the wide-geographically spread receivers. WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. Regarding the network security, WiMAX provides strong user authentication, access control, data privacy and data integrity using sophisticated encryption technology. WiMAX technology is the only solution for isolated locations where e-learning distributed platforms need to be used. This paper focuses on security issues for e-learning solutions, especially when WiMAX technology is used.

Keywords


WiMAX, security, e-learning solutions, mobile networks, cloud computing

Full Text:

PDF

References


Jeffrey G.Andrews, Arunabha Ghosh, Rias Muhamed, Fundamentals of WiMAX, Prentice Hall, 2007

Deepak Pareek, WiMAX – Taking Wireless to the MAX, Auerbach Publications, New York, 2006

Syed Ahson, Mohammad Ilyas, WiMAX – Standards and Security, CRC press, 2006

DeCoufle B., The impact of cloud computing in schools, The Datacenter Journal, http://datacenterjournal.com/ content/view/3032/40/, July 2009

Creeger M., CTO Roundtable: Cloud Computing, Communications of the ACM, vol. 52, no. 8, august 2009, pp. 50-56

Boja C., Bătăgan L., Software Characteristics of M-Learning Applications in Proc. of. 10th WSEAS International Conference on Mathematics and Computers in Business and Economics (MCBE'09), Prague, Czech Republic, March 23-25, 2009, ISSN: 1790-5109, ISBN: 978-960-474-063-5, pp. 88-93;

Danail D., Ivo H., Mobile Learning Applications Ubiquitous Characteristics and Technological Solutions, Cybernetics and Information Technologies, Volume 6, No 3, Sofia, 2006, ISSN: 1311-9702;

Brodkin J., Gartner: Seven cloud-computing security risks, Infoworld, July 2008, http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853, retrieved on August 2009

Pocatilu P., Boja C., Quality Characteristics and Metrics related to M-Learning Process, Amfiteatru Economic, Year XI, June 2009, No. 26, pp. 346-354


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)