Atjaunināt sīkdatņu piekrišanu

E-grāmata: Modelling and Verification of Secure Exams

  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems.

After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy that classifies exams by types and categories. Chapter 3 contains formal definitions of the authentication, privacy, and verifiability requirements for exams, a framework based on the applied pi-calculus for the specification of authentication and privacy, and a more abstract approach based on set-theory that enables the specification of verifiability. Chapter 4 describes the Huszti-Peth protocol in detail and proposes a security enhancement. In Chap. 5 the author details Remark!, a protocol for Internet-based exams, discussing its cryptographic building blocks and some security considerations. Chapter 6 focuses on WATA, a family of computer-assisted exams that employ computer assistance while keeping face-to-face testing. The chapter also introduces formal definitions of accountability requirements and details the analysis of a WATA protocol against such definitions. In Chaps. 4, 5, and 6 the author uses the cryptographic protocol verifier ProVerif for the formal analyses. Finally, the author outlines future work in Chap. 7. 

The book is valuable for researchers and graduate students in the areas of information security, in particular for people engaged with exams or protocols.

Recenzijas

This book might be of interest to everyone who wants to learn more about the nature of exams in general, and in particular about how to model and verify them. The book provides a good overview of key elements of various types of exams and their corresponding security requirements, leading to a better understanding of exam protocols in general . The description of the individual exam protocols is very detailed and easy to follow. (Diego Marmsoler, fmeurope.org, October 29, 2021)

1 Introduction
1(6)
1.1 Objectives and Results
2(2)
1.2 Outline
4(3)
2 Preliminaries and Definitions
7(16)
2.1 Tasks
7(1)
2.2 Roles and Principals
8(1)
2.3 Phases
9(1)
2.4 Threats
10(2)
2.5 Taxonomy
12(3)
2.5.1 Exam Types
12(2)
2.5.2 Exam Categories
14(1)
2.6 Exams as Security Protocols
15(1)
2.7 The Applied π-calculus
16(4)
2.8 Modelling Exams Formally
20(3)
3 Security Requirements
23(20)
3.1 Formal Approaches
24(2)
3.2 Authentication
26(4)
3.3 Privacy
30(4)
3.4 Verifiability
34(6)
3.4.1 Individual Verifiability
37(2)
3.4.2 Universal Verifiability
39(1)
3.5 Conclusion
40(3)
4 The Huszti-Petho Protocol
43(22)
4.1 Reusable Anonymous Return Channel
45(2)
4.2 Protocol Description
47(3)
4.3 Security of Reusable Anonymous Return Channel
50(4)
4.4 Security of the Huszti-Petho Protocol
54(7)
4.5 Fixing Authentication
61(2)
4.6 Conclusion
63(2)
5 The Remark! Internet-Based Exam
65(30)
5.1 Internet-Based Exams
66(1)
5.2 Exponentiation Mixnet
67(1)
5.3 Protocol Description
68(3)
5.4 Security of Remark!
71(22)
5.5 Conclusion
93(2)
6 The WATA Family
95(30)
6.1 Computer-Assisted and Computer-Based Exams
96(1)
6.2 WATA I & II
97(4)
6.3 WATA III
101(4)
6.4 WATA IV
105(6)
6.5 WATA Without TTP
111(11)
6.5.1 Dispute Resolution
117(1)
6.5.2 Security of WATA Without TTP
118(4)
6.6 Conclusion
122(3)
7 Conclusions
125(4)
Bibliography 129
Rosario Giustolisi is an assistant professor at the IT University of Copenhagen. He received his PhD from the University of Luxembourg where he worked on a formal framework for the security analysis of exam protocols and on the design of protocols for computer-assisted and Internet-based exams. As a postdoc at SICS RISE and a member of the Security Lab in Lund, he investigated group-based authentication mechanisms for future 5G networks. His research interests include the modeling and formal analysis of secure network protocols and the sociotechnical security aspects of real-world systems.