Proceedings of the 8th International Conference on Computer Supported Education 2016
DOI: 10.5220/0005874904020407
|View full text |Cite
|
Sign up to set email alerts
|

Cybertrust in e-Learning Environment based on Network Time Synchronization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Network Time Synchronization (NTS) provides standardized cyber-trust assurance for e-learning systems by using three layers of trust criteria expanded to the public internet cyberspace together with an independent Network Time Synchronization source. The three layers of trust criteria are the basic factors that combine to granularly model what a legal user should be and are based on five trust characteristics targeted, subjective, measurable, dynamics, and conditionally passed [13]. Independent Network Time Synchronization source is used because in-built time synchronization modules and synchronization subnets based on network time protocol can be compromised which can threaten end-user and elearning platform private keys and digital signatures while also endangering the whole public key infrastructure used to secure the communication.…”
Section: Cryptographic Techniques In E-learning Technologiesmentioning
confidence: 99%
“…Network Time Synchronization (NTS) provides standardized cyber-trust assurance for e-learning systems by using three layers of trust criteria expanded to the public internet cyberspace together with an independent Network Time Synchronization source. The three layers of trust criteria are the basic factors that combine to granularly model what a legal user should be and are based on five trust characteristics targeted, subjective, measurable, dynamics, and conditionally passed [13]. Independent Network Time Synchronization source is used because in-built time synchronization modules and synchronization subnets based on network time protocol can be compromised which can threaten end-user and elearning platform private keys and digital signatures while also endangering the whole public key infrastructure used to secure the communication.…”
Section: Cryptographic Techniques In E-learning Technologiesmentioning
confidence: 99%