• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Modelling and verification of secure exams /

پدید آورنده
Rosario Giustolisi.

موضوع
Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3030097897
(Number (ISBN
3319671073
(Number (ISBN
3319671081
(Number (ISBN
9783030097899
(Number (ISBN
9783319671079
(Number (ISBN
9783319671086
Erroneous ISBN
3319671065
Erroneous ISBN
9783319671062

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Modelling and verification of secure exams /
General Material Designation
[Book]
First Statement of Responsibility
Rosario Giustolisi.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
2018.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

SERIES

Series Title
Information security and cryptography,
ISSN of Series
1619-7100

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references.

CONTENTS NOTE

Text of Note
Introduction -- Preliminaries and Definitions -- Security Requirements -- The Huszti-Pethő Protocol -- The Remark! Internet-Based Exam -- The WATA Family -- Conclusions.
0

SUMMARY OR ABSTRACT

Text of Note
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy that classifies exams by types and categories. Chapter 3 contains formal definitions of the authentication, privacy, and verifiability requirements for exams, a framework based on the applied pi-calculus for the specification of authentication and privacy, and a more abstract approach based on set-theory that enables the specification of verifiability. Chapter 4 describes the Huszti-Pethő protocol in detail and proposes a security enhancement. In Chap. 5 the author details Remark!, a protocol for Internet-based exams, discussing its cryptographic building blocks and some security considerations. Chapter 6 focuses on WATA, a family of computer-assisted exams that employ computer assistance while keeping face-to-face testing. The chapter also introduces formal definitions of accountability requirements and details the analysis of a WATA protocol against such definitions. In Chaps. 4, 5, and 6 the author uses the cryptographic protocol verifier ProVerif for the formal analyses. Finally, the author outlines future work in Chap. 7. The book is valuable for researchers and graduate students in the areas of information security, in particular for people engaged with exams or protocols.

OTHER EDITION IN ANOTHER MEDIUM

Title
Modelling and verification of secure exams.
International Standard Book Number
9783319671062

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer security.
Computer networks-- Security measures.
Computer security.
COMPUTERS-- Security-- General.

(SUBJECT CATEGORY (Provisional

COM-- 053000
UMB
UMB
URY
URY

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - PRIMARY RESPONSIBILITY

Giustolisi, R., (Rosario)

ORIGINATING SOURCE

Date of Transaction
20200823102411.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival