Books > Social sciences > Politics & government > Public administration
|
Buy Now
Modelling and Verification of Secure Exams (Hardcover, 1st ed. 2018)
Loot Price: R1,936
Discovery Miles 19 360
You Save: R985
(34%)
|
|
Modelling and Verification of Secure Exams (Hardcover, 1st ed. 2018)
Series: Information Security and Cryptography
Expected to ship within 12 - 17 working days
|
In this book the author introduces a novel approach to securing
exam systems. He provides an in-depth understanding, useful for
studying the security of exams and similar systems, such as public
tenders, personnel selections, project reviews, and conference
management systems. After a short chapter that explains the context
and objectives of the book, in Chap. 2 the author introduces
terminology for exams and the foundations required to formulate
their security requirements. He describes the tasks that occur
during an exam, taking account of the levels of detail and
abstraction of an exam specification and the threats that arise out
of the different exam roles. He also presents a taxonomy that
classifies exams by types and categories. Chapter 3 contains formal
definitions of the authentication, privacy, and verifiability
requirements for exams, a framework based on the applied
pi-calculus for the specification of authentication and privacy,
and a more abstract approach based on set-theory that enables the
specification of verifiability. Chapter 4 describes the
Huszti-Petho protocol in detail and proposes a security
enhancement. In Chap. 5 the author details Remark!, a protocol for
Internet-based exams, discussing its cryptographic building blocks
and some security considerations. Chapter 6 focuses on WATA, a
family of computer-assisted exams that employ computer assistance
while keeping face-to-face testing. The chapter also introduces
formal definitions of accountability requirements and details the
analysis of a WATA protocol against such definitions. In Chaps. 4,
5, and 6 the author uses the cryptographic protocol verifier
ProVerif for the formal analyses. Finally, the author outlines
future work in Chap. 7. The book is valuable for researchers and
graduate students in the areas of information security, in
particular for people engaged with exams or protocols.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.