Towards security goals in summative e-assessment security
暂无分享,去创建一个
[1] K. Rabuzin,et al. E-learning: Biometrics as a Security Factor , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).
[2] Steven Furnell,et al. A security framework for online distance learning and training , 1998, Internet Res..
[3] Bashar Nuseibeh,et al. Core Security Requirements Artefacts , 2004 .
[4] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[5] Harmesh Aojula,et al. Computer-based, online summative assessment in undergraduate pharmacy teaching: The Manchester experience , 2006 .
[6] Gary B. Wills,et al. Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems , 2008, SECRYPT.
[7] C. Chellappan,et al. Authentication of e-learners using multimodal biometric technology , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[8] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[9] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[10] Bashar Nuseibeh,et al. Deriving security requirements from crosscutting threat descriptions , 2004, AOSD '04.
[11] José Alberto Hernández,et al. Biometrics in Online Assessments: A Study Case in High School Students , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).
[12] Charles P. Pfleeger,et al. Security in computing , 1988 .
[13] A. Zoubir,et al. EURASIP Journal on Advances in Signal Processing , 2011 .
[14] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[15] Bashar Nuseibeh,et al. A framework for security requirements engineering , 2006, SESS '06.
[16] N. Rowe. Cheating in Online Student Assessment: Beyond Plagiarism , 2004 .
[17] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[18] Emil Marais,et al. Security Issues Specific to e-Assessments , 2006 .
[19] Bashar Nuseibeh,et al. Security Requirements Engineering: A Framework for Representation and Analysis , 2008, IEEE Transactions on Software Engineering.
[20] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.