2017 21st International Conference Information Visualisation (IV) 2017
DOI: 10.1109/iv.2017.70
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges in e-Assessment and Technical Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…In [12], the security of the TeSLA e-assessment system was analyzed and discussed w.r.t. the General Data Protection Regulation (GDPR) [6] recommendations.…”
Section: Resulting Constructionmentioning
confidence: 99%
“…In [12], the security of the TeSLA e-assessment system was analyzed and discussed w.r.t. the General Data Protection Regulation (GDPR) [6] recommendations.…”
Section: Resulting Constructionmentioning
confidence: 99%
“…Rescorla and Dierks (2008)), deployed on the whole architecture with mutual authentication, hence ensuring confidentiality and integrity of every data exchange. The underlying Public Key Infrastructure for TLS deployment and management is fully detailed in Kiennert et al (2017b).…”
Section: The Tesla Architecturementioning
confidence: 99%
“…In this section, we present our precise anonymous certification scheme, in order to extend the e-assessment framework reported in [16]. The solution is based on an existing attribute-based signature scheme previously presented in [15].…”
Section: Our Constructionmentioning
confidence: 99%
“…The communications between the components are secured by the TLS protocol [22], deployed on the whole architecture with mutual authentication, hence ensuring confidentiality and integrity of every data exchange. The underlying Public Key Infrastructure for TLS deployment and management is detailed in [16].…”
Section: Tesla Architecturementioning
confidence: 99%
See 1 more Smart Citation