- Communities& Collections
- Browse Items by:
- Issue Date
- Author
- Title
- Subject
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.adviser | Khlifi, Yassine Ramdhane | en_US |
dc.contributor.author | Alqahtani, Abdulaziz Saleh | en_US |
dc.date.accessioned | 2020-02-11T05:35:08Z | - |
dc.date.available | 2020-02-11T05:35:08Z | - |
dc.date.issued | 2019 | en_US |
dc.identifier.uri | https://dorar.uqu.edu.sa/uquui/handle/20.500.12248/116037 | - |
dc.description | 46 paper | en_US |
dc.description.abstract | With the rapid and remarkable growth of technologies for the past few years, the Internet has evolved and expanded to include the emergence of new and Internet-related technologies. Also, the applications developed and processed data and used the Internet in many magazines, including training through the Internet and developed to include all areas of education and the emergence of e-learning. In addition, people have increasingly used e-learning as an attractive education. Also, progress has been made in admission and distance learning and the opportunity to enroll in schools, institutes, and universities remotely and through the Internet. Therefore, educational institutions have traded e-learning platforms and distance education because of the increasing desire of people to learn online. In addition, e-learning and e-learning platforms have provided e-learning and e-learning platforms and are one of the main pillars of learning and one of the most important activities in the e-learning environment. Therefore, the use of electronic notes provides benefits such as learning opportunities, automatic signs and direct comments. Also, provide information on the delivery of the outputs of the educational process and improve the educational learning environment [1]. However, the availability of the e-learning infrastructure has been exposed to a range of illegal measures that rely on electronic assessments over the Internet. Also, e-learning stakeholders, faculty, students and databases have raised security problems in e-learning systems [2]. Therefore, the provision of security requirements ensures confidentiality, integrity, availability and authenticity that can be used in e-learning to ensure the safety of stakeholders against potential threats and risks. However, the potential threats and vulnerabilities of the e-learning environment, which contain many resources such as hardware, software, and data, are always being protected by security policies [3]. For this reason, users of e-learning systems complain about the weakness of the basic systems and the lack of appropriate authentication mechanisms for e-evaluation or e-testing. In addition, user authentication is the basis of protection in any security system, because it ensures the identity of the user when trying to access the system resources and ensure the granting of access to rights to the system resources. The use of new technologies has increased the growing immoral behavior of students [4] [5]. The immoral behavior of students includes the use of technology in fraud during electronic testing using other electronic devices such as chats and forums. In addition, students can cheat by giving the user name and password to another student to serve as the original student. If the number of students is very large and the number of supervisors few will not notice these behaviors. In [6] the teachers noted the lack of confidence in the results and standards of electronic assessments due to the increased fraud methodologies by students and their use of rapid advances in technology. Finally, to verify the validity of our proposed scheme and evaluate its performance and effectiveness, we will perform simulations using a virtual e-learning platform which is designed based on the MATLAB tool. Also, we will discuss the results obtained and analyze them and verify the strength of the new validation scheme. The present research work is organized as follows: The first chapter will provide e-learning and basic concepts of the characteristics of e-learning and its development and challenges. Chapter 2 is going to describe the security of information, threats, and attacks on information security. Also, it will discuss security in the e-learning platforms and authentication in e-learning and then discusses the methods of authentication and evaluation in e-learning and towards a new authentication system. Next, chapter 3 will present the proposed safety scheme system and describes the modeling, associated algorithm, analysis and discussion and then validation of the proposed approach. Chapter 4 will discuss the validation and evaluation of the proposed validation scheme and the numerical results by simulating, analyzing and discussing the results. | en_US |
dc.language.iso | عربي | en_US |
dc.publisher | جامعة أم القرى | en_US |
dc.relation.isformatof | مكتبة الملك عبدالله بن عبدالعزيز الجامعية | en_US |
dc.title | An advanced security scheme for users’ authentication over e-learning platform | en_US |
dc.identifier.callnum | 23279 | - |
dc.type.format | ماجستير | en_US |
dc.publisher.country | المملكة العربية السعودية | en_US |
dc.relation.collage | الحاسب الآلي ونظم المعلومات | en_US |
dc.type.status | مجاز | en_US |
dc.publisher.city | مكة المكرمة | en_US |
dc.date.issuedhijri | 1440 | en_US |
dc.relation.dep | علوم الحاسب الآلي | en_US |
Appears in Collections : | الرسائل العلمية المحدثة |
Files in This Item :
File | Description | Size | Format | |
---|---|---|---|---|
Abdulaziz Alqahtani_Master_19_May.pdf " Restricted Access" | الرسالة الكاملة | 1.07 MB | Adobe PDF | View/OpenRequest a copy |
Title.pdf " Restricted Access" | غلاف | 131.82 kB | Adobe PDF | View/OpenRequest a copy |
absa.pdf " Restricted Access" | ملخص الرسالة بالعربي | 172.55 kB | Adobe PDF | View/OpenRequest a copy |
abse.pdf " Restricted Access" | ملخص الرسالة بالإنجليزي | 85.39 kB | Adobe PDF | View/OpenRequest a copy |
indu.pdf " Restricted Access" | المقدمة | 128.4 kB | Adobe PDF | View/OpenRequest a copy |
cont.pdf " Restricted Access" | فهرس الموضوعات | 128.65 kB | Adobe PDF | View/OpenRequest a copy |
Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.
Comments (0)