Adaptive Computer Management System Based on Network Theory Protects Identity
Euporia is a security program that automates transactions in online learning systems. This software, for any large online environment where security is an issue, enables up to 50,000 users to interact within a vastly complex institutional environment while preserving privacy and confidentiality. The software immediately changes privileges and restrictions when needed. University of Florida researchers have created software that can instantaneously resolve the expressible rights for any given transaction as interactions dynamically unfold within the system (i.e. a class ends and the student is gracefully locked out). It maintains the security of privacy and confidentiality while eliminating the hassle of manually making changes in the system. This tool can be used for a wide variety of purposes such as adaptive learning platforms, complex social networking, regulatory compliance systems, and credit-bearing open courseware.
Security software that automatically updates privileges and privacy rights
- Automates the rights and limitations of users, applying regulations more accurately and uniformly
- Changes rights instantaneously, requiring fewer human resources
- Programs very quickly, saving money and time
A network is a collection of nodes (user/institution/class) connected together in at least one way. Higher nodes scatter their rights downward through the hierarchy. The hierarchy of rights is based on explicit and implicit associations amongst nodes in a network. A computer receives instructions, creating a memory in the computer system for determining which transactions between computers are permissible at any point. Euporia uses Network Theory to dynamically generate a snapshot of permissible interactions with a minimum of manual intervention. It does so by intermittently constructing a hierarchy of rights based on associations amongst nodes in a network. This hierarchy is maintained in system memory and is available for instantaneous access as transactions occur. This software provides privacy protection, limiting the potential for abuse and exploitation as well as unintended exposure of sensitive data. It is the ideal software where compliance with federal, state, and local regulation is required.