Information Technology Reference
In-Depth Information
Fig. 1. Users registration protocol. (1): User requests registration (2): Moodle Server
sends to the RA the user info (3): RA generates a new Ticket ID (nonce) and sends it
to the Moodle Server (4.1): The Moodle Server sends the Ticket ID to the user (4.2)
The Moodle Server sends an email with an activation link to the user (5): The user
accesses the activation link (6): The RA asks the user for his Ticket ID and user name
(7): The user sends his user name and the Ticket ID he received in step 4 (8): If the
challenge result is successful, the RA asks the CA to send the user his new certificate
(9) The CA sends the user his new certificate
This is the case of the PRNG proposed in [16], which is the PRNG used in our
implementation.
3.2 Preliminary Analyisis of Usability
We have emphasized that usability is of major importance for interactive sys-
tems, and maybe even more when securing environments, because a misuse of the
functionality could lead to huge losses. This is why we expose here some thoughts
on this matter. Also, some reflections about the ease of use of the functionality
are presented. Nevertheless, we are planning to test our contribution in a real
scenario, which will provide us real users' feedback to improve our functionality.
The analysis we have carried out for the introduced overload is not intended
to be exhaustive. For a detailed study of the extra cost introduced by the SSL
protocol one can consult existing works like [11,15], where it is proved that a
well designed server architecture can provide good results in terms of throughput
and response time. We have performed some tests simulating a basic scenario,
consisting in sending a file of
400
KB every
30
seconds, during
10
minutes.
Search WWH ::




Custom Search