Towards security goals in summative e-assessment security

The general security goals of computer a system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the fundamental C-I-A security goals; rather we define security goals which are specific to summative e-assessment security.

[1]  K. Rabuzin,et al.  E-learning: Biometrics as a Security Factor , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).

[2]  Steven Furnell,et al.  A security framework for online distance learning and training , 1998, Internet Res..

[3]  Bashar Nuseibeh,et al.  Core Security Requirements Artefacts , 2004 .

[4]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[5]  Harmesh Aojula,et al.  Computer-based, online summative assessment in undergraduate pharmacy teaching: The Manchester experience , 2006 .

[6]  Gary B. Wills,et al.  Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems , 2008, SECRYPT.

[7]  C. Chellappan,et al.  Authentication of e-learners using multimodal biometric technology , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[8]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[10]  Bashar Nuseibeh,et al.  Deriving security requirements from crosscutting threat descriptions , 2004, AOSD '04.

[11]  José Alberto Hernández,et al.  Biometrics in Online Assessments: A Study Case in High School Students , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).

[12]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[13]  A. Zoubir,et al.  EURASIP Journal on Advances in Signal Processing , 2011 .

[14]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[15]  Bashar Nuseibeh,et al.  A framework for security requirements engineering , 2006, SESS '06.

[16]  N. Rowe Cheating in Online Student Assessment: Beyond Plagiarism , 2004 .

[17]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[18]  Emil Marais,et al.  Security Issues Specific to e-Assessments , 2006 .

[19]  Bashar Nuseibeh,et al.  Security Requirements Engineering: A Framework for Representation and Analysis , 2008, IEEE Transactions on Software Engineering.

[20]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.