Font Size: a A A

A Study Of Security Policy On The Sub Testing System Of The Distance Educational System

Posted on:2003-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhouFull Text:PDF
GTID:2168360092465831Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Along with the development of Internet at very fast speed, the development of the distance educational system has been driven greatly. The testing system, as an indispensable part of the distance educational system, has an important status in the implement of the distance education. A well testing system not only reflect the teaching is good or not, but also assure the quality and effect in the education.At the same time, in order to reflect the real state of the student holding knowledge, the distance test must be impersonal and equitable, so the testing system has to be acquired to provide adequate security, and to be prevented from cheating and deceiving in the network.CC criteria is a security evaluation criteria which has been established by the United State, Canada, Britain, Deutschland, France and Holland, etc. The CC provides the security policy in a great extent. Begin with the study of the CC criteria, according to the idea of CC, this paper has analyzed the security environment and objective, and get the security requirement in the testing system. This paper has also presented the security policy in the testing system.In the network and information security, the Cryptography acts as an important role. So it is very important that the algorithm is robust and secure. This paper has studied many kinds of cryptogrammic algorithms and technologies, especially the triple des algorithm and chaos cryptography, it has developed a cascading algorithm, which was applied in the testing system.Web services provide the concept about mutual operation, it can communicate and share data smoothly in the different system. This paper has designed distribute testing system which was based on web services, and synthetically used related security technologies, begin with user's identification and authentication, the confidentiality, integrality and availability of the testing data, it has implemented the security of the testing system...
Keywords/Search Tags:testing system, security policy, cascading algorithm, Web services
PDF Full Text Request
Related items