Modelling and Verification of Secure Exams

Modelling and Verification of Secure Exams
Author :
Publisher : Springer
Total Pages : 144
Release :
ISBN-10 : 9783319671079
ISBN-13 : 3319671073
Rating : 4/5 (073 Downloads)

Book Synopsis Modelling and Verification of Secure Exams by : Rosario Giustolisi

Download or read book Modelling and Verification of Secure Exams written by Rosario Giustolisi and published by Springer. This book was released on 2018-03-19 with total page 144 pages. Available in PDF, EPUB and Kindle. Book excerpt: In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy that classifies exams by types and categories. Chapter 3 contains formal definitions of the authentication, privacy, and verifiability requirements for exams, a framework based on the applied pi-calculus for the specification of authentication and privacy, and a more abstract approach based on set-theory that enables the specification of verifiability. Chapter 4 describes the Huszti-Pethő protocol in detail and proposes a security enhancement. In Chap. 5 the author details Remark!, a protocol for Internet-based exams, discussing its cryptographic building blocks and some security considerations. Chapter 6 focuses on WATA, a family of computer-assisted exams that employ computer assistance while keeping face-to-face testing. The chapter also introduces formal definitions of accountability requirements and details the analysis of a WATA protocol against such definitions. In Chaps. 4, 5, and 6 the author uses the cryptographic protocol verifier ProVerif for the formal analyses. Finally, the author outlines future work in Chap. 7. The book is valuable for researchers and graduate students in the areas of information security, in particular for people engaged with exams or protocols.


Modelling and Verification of Secure Exams Related Books

Modelling and Verification of Secure Exams
Language: en
Pages: 144
Authors: Rosario Giustolisi
Categories: Computers
Type: BOOK - Published: 2018-03-19 - Publisher: Springer

DOWNLOAD EBOOK

In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams a
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification
Language: en
Pages: 304
Authors: Simon Collart-Dutilleul
Categories: Computers
Type: BOOK - Published: 2019-05-28 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Third International Conference on Reliability, Safety, and Security of Railway Systems, RSSRail 2019, held
CISSP Exam Study Guide For Security Professionals: 5 Books In 1
Language: en
Pages: 700
Authors: Richie Miller
Categories: Architecture
Type: BOOK - Published: 2022-12-18 - Publisher: Richie Miller

DOWNLOAD EBOOK

If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on
Computer Safety, Reliability, and Security
Language: en
Pages: 418
Authors: Frank Ortmeier
Categories: Computers
Type: BOOK - Published: 2012-09-07 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeb
Computer Safety, Reliability, and Security
Language: en
Pages: 408
Authors: Amund Skavhaug
Categories: Computers
Type: BOOK - Published: 2016-09-01 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of four workshops co-located with SAFECOMP 2016, the 35th International Conference on Computer Safety, Reliabilit