{"id":"https://openalex.org/W2483840160","doi":"https://doi.org/10.4018/ijhcitp.2016070107","title":"Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection","display_name":"Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2483840160","doi":"https://doi.org/10.4018/ijhcitp.2016070107","mag":"2483840160"},"language":"en","primary_location":{"id":"doi:10.4018/ijhcitp.2016070107","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijhcitp.2016070107","pdf_url":null,"source":{"id":"https://openalex.org/S193803878","display_name":"International Journal of Human Capital and Information Technology Professionals","issn_l":"1947-3478","issn":["1947-3478","1947-3486"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Human Capital and Information Technology Professionals","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089465424","display_name":"Radi Romansky","orcid":"https://orcid.org/0000-0003-2228-9397"},"institutions":[{"id":"https://openalex.org/I31151848","display_name":"Technical University of Sofia","ror":"https://ror.org/052prhs50","country_code":"BG","type":"education","lineage":["https://openalex.org/I31151848"]}],"countries":["BG"],"is_corresponding":true,"raw_author_name":"Radi Romansky","raw_affiliation_strings":["Technical University of Sofia, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Technical University of Sofia, Sofia, Bulgaria","institution_ids":["https://openalex.org/I31151848"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070488372","display_name":"Irina Noninska","orcid":null},"institutions":[{"id":"https://openalex.org/I31151848","display_name":"Technical University of Sofia","ror":"https://ror.org/052prhs50","country_code":"BG","type":"education","lineage":["https://openalex.org/I31151848"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Irina Noninska","raw_affiliation_strings":["Technical University of Sofia, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Technical University of Sofia, Sofia, Bulgaria","institution_ids":["https://openalex.org/I31151848"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089465424"],"corresponding_institution_ids":["https://openalex.org/I31151848"],"apc_list":null,"apc_paid":null,"fwci":3.9809,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.94242188,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"7","issue":"3","first_page":"89","last_page":"106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12734","display_name":"Information Systems and Technology Applications","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9506000280380249,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7235775589942932},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6005198955535889},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.48914816975593567},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4673479199409485},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.457069993019104},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4258766174316406},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.424538254737854},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28117039799690247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7235775589942932},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6005198955535889},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.48914816975593567},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4673479199409485},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.457069993019104},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4258766174316406},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.424538254737854},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28117039799690247},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijhcitp.2016070107","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijhcitp.2016070107","pdf_url":null,"source":{"id":"https://openalex.org/S193803878","display_name":"International Journal of Human Capital and Information Technology Professionals","issn_l":"1947-3478","issn":["1947-3478","1947-3486"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Human Capital and Information Technology Professionals","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jhcitp:v:7:y:2016:i:3:p:89-106","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJHCITP.2016070107","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W147290860","https://openalex.org/W349923146","https://openalex.org/W1566144591","https://openalex.org/W1996685222","https://openalex.org/W2016155469","https://openalex.org/W2083149404","https://openalex.org/W2086124695","https://openalex.org/W2135490366","https://openalex.org/W2143900028","https://openalex.org/W2147013840","https://openalex.org/W2169328170","https://openalex.org/W2187280856","https://openalex.org/W2189108815","https://openalex.org/W2294968878","https://openalex.org/W2314091487","https://openalex.org/W2320648366","https://openalex.org/W2333588432","https://openalex.org/W2606086120","https://openalex.org/W2795890917"],"related_works":["https://openalex.org/W2295836226","https://openalex.org/W4225340788","https://openalex.org/W2025792237","https://openalex.org/W2272742059","https://openalex.org/W2098937825","https://openalex.org/W3010786834","https://openalex.org/W3123738772","https://openalex.org/W1996189363","https://openalex.org/W4386447091","https://openalex.org/W2940702331"],"abstract_inverted_index":{"The":[0,94],"contemporary":[1],"digital":[2],"world":[3],"based":[4,242],"on":[5,211,243],"network":[6,140],"communications,":[7],"globalization":[8],"and":[9,21,55,58,64,86,118,152,165,183,206,225,251],"information":[10,35,89,136,161,181,204],"sharing":[11,135],"outlines":[12],"new":[13,110],"important":[14,54],"targets":[15],"in":[16,186,191],"the":[17,40,220,236],"area":[18],"of":[19,30,42,48,66,96,167,180,200,217],"privacy":[20,184,207],"personal":[22,67,88],"data":[23,68,125,146],"protection":[24,65,185],"which":[25],"reflect":[26],"to":[27,33,45,78,100,104,133,144,156,159,175,219,235],"applied":[28],"principles":[29,179,213],"secure":[31,43,233],"access":[32,44,132,160,218,234],"proposed":[34,77],"structures.":[36],"In":[37,142,173],"this":[38,97,192],"reason":[39],"aim":[41],"all":[46,87],"resources":[47,162,222,237],"an":[49,102,197],"e-learning":[50,107,168,187,230],"environment":[51],"is":[52,99,208,223,238],"very":[53],"adequate":[56],"technological":[57],"organizational":[59,198],"measures":[60],"for":[61,203,227],"authentication,":[62],"authorization":[63],"must":[69,149],"be":[70,76,150,157,171],"applied.":[71],"Strong":[72],"security":[73,126,182,205],"procedures":[74],"should":[75],"protect":[79],"user's":[80],"profiles,":[81],"designed":[82,244],"after":[83],"successful":[84],"registration":[85],"collected":[90],"by":[91,139,256],"educational":[92],"processes.":[93],"goal":[95],"article":[98],"present":[101],"idea":[103],"combine":[105],"traditional":[106],"technologies":[108,122],"with":[109,232],"opportunities":[111],"that":[112],"give":[113],"mobile":[114],"applications,":[115],"cloud":[116],"services":[117],"social":[119],"computing.":[120],"These":[121],"can":[123],"endanger":[124],"since":[127],"they":[128],"make":[129],"possible":[130],"remote":[131],"resources,":[134],"between":[137],"participants":[138],"communications.":[141],"order":[143,174],"avoid":[145],"vulnerabilities":[147],"users":[148],"identified":[151],"authenticated":[153],"before,":[154],"i.e.":[155],"allowed":[158],"otherwise":[163],"integrity":[164],"confidentiality":[166],"system":[169,202,221],"could":[170],"destroyed.":[172],"propose":[176],"solution":[177],"basic":[178],"processes":[188],"are":[189,259],"discussed":[190],"article.":[193],"As":[194],"a":[195,201,214],"result,":[196],"scheme":[199],"proposed.":[209],"Based":[210],"these":[212],"graph":[215],"formalization":[216],"made":[224],"architecture":[226,231],"combined":[228],"(heterogenic)":[229],"designed.":[239],"Analytical":[240],"investigation":[241],"Markov":[245],"chain":[246],"has":[247],"been":[248],"carried":[249],"out":[250],"several":[252],"statistical":[253],"assessments":[254],"delivered":[255],"Develve":[257],"software":[258],"discussed.":[260]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
