Security and privacy in the TeSLA architecture
Autor: | Malinka Ivanova, Anna Rozeva, Joaquin Garcia-Alfaro, Christophe Kiennert |
---|---|
Přispěvatelé: | Département Réseaux et Services de Télécommunications (RST), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Institut Polytechnique de Paris (IP Paris), Technical University of Sofia [Bulgaria] (TU-Sofia) |
Jazyk: | angličtina |
Rok vydání: | 2020 |
Předmět: |
Computer science
02 engineering and technology Computer security computer.software_genre 050601 international relations Identity management [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] 0202 electrical engineering electronic engineering information engineering [INFO]Computer Science [cs] Architecture GDPR Authentication 05 social sciences 020206 networking & telecommunications Authorship 0506 political science Software deployment Privacy X.509 certificates Technical university Public key infrastructures Security Anonymity computer |
Zdroj: | Engineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions Engineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions, 34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT), 978-3-030-29325-3. ⟨10.1007/978-3-030-29326-0_5⟩ Engineering Data-Driven Adaptive Trust-based e-Assessment Systems ISBN: 9783030293253 |
Popis: | International audience; In this chapter, we address security and privacy aspects in TeSLA, from a technical standpoint. The chapter is structured in three main parts. Firstly, we outline the main concepts underlying security in TeSLA, with regards to the protection of learners’ data and the architecture itself. Secondly, we provide an empirical analysis of a specific deployment in one of the members of the consortium. Some representative aspects such as security levels in terms of storage, processing and transfer are analyzed in the deployment of TeSLA at the Technical University of Sofia. In the third part, we address identity management issues and outline additional efforts we consider worth exploring. |
Databáze: | OpenAIRE |
Externí odkaz: |