﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Iberian Journal of Applied Sciences and Innovations</JournalTitle>
      <ISSN>2184-8114</ISSN>
      <Volume>1</Volume>
      <Issue>1</Issue>
      <PubDate PubStatus="epublish">
        <Year>2023</Year>
        <Month>11</Month>
        <Day>25</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>A novel security usability method for   e-learning platforms </ArticleTitle>
    <VernacularTitle>A novel security usability method for   e-learning platforms</VernacularTitle>
    <FirstPage></FirstPage>
    <LastPage></LastPage>
    <ELocationID EIdType="doi" />
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Golbarg</FirstName>
        <LastName>Nasiri</LastName>
        <Affiliation></Affiliation>
      </Author>
      <Author>
        <FirstName>Negin</FirstName>
        <LastName>Hajiahmadi</LastName>
        <Affiliation></Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2020</Year>
      <Month>1</Month>
      <Day>24</Day>
    </History>
    <Abstract>Traditionally, security and usability has  acted against each other. Specially, for inexpert people,  usability means ignoring security and secure systems  are not usable. Researchers and developers recognized  that current security problems would be solved only  through addressing issues raised through usability and  human factor. In fact, future of cyber security relies on  deployment of security technologies which widely could be used by inexpert users. Interpretative Key  Management (IKM) is a cryptographic key  management system under category of master key  which empowers users to generate the cryptographic keys within the end-user systems. This article proposes a novel method which specifically helps beginners to  achieve both safety and usability of communications  and network-based software by utilizing IKM. In this 
method processes of user authentication and  encryption of transmitted and stored data will be fully  automated and does not require the users to do any security configuration. The main targeted application  of proposed method is to enhance security and  usability of e-learning systems when the trainees do not have enough computer knowledge. </Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">security</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">usability</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">security usability</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">authentication</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">e-learning</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://ijasi.iberianjournals.com/ar/Article/Download/44802</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>