Abstract
We categorize the security requirements for e-exam in authentication, anonymity and privacy requirements. For instance, we want that only the test answers submitted by registered candidates to be accepted. Similarly, we want that only registered examiners can evaluate the answers submitted by candidates. As an example of an anonymity property, we define anonymous marking, which means that no one can learn the link between a candidate and the answer she submitted. For instance, it is interesting to find out how to guarantee anonymity and authentication properties.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
In the post-proceeding version of the paper we clarified that some steganalysis techiniques may help here although threats via subliminal channels are hard to rule out.
- 2.
Two approaches for automatically grading open-ended questions have been proposed in http://aow2012.yolasite.com/resources/aow20120_submission_10.pdf and http://linc.mit.edu/linc2013/proceedings/Session3/Session3Mit-Par.pdf.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Giustolisi, R. (2014). Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion). In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-12400-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12399-8
Online ISBN: 978-3-319-12400-1
eBook Packages: Computer ScienceComputer Science (R0)