The document outlines a plan to pilot the use of digital signatures for authenticating documents at Swansea Metropolitan University. It will focus on using digital signatures to authenticate online assessments as the university is considering online distance learning courses. The pilot will use Open Office software and a free certification authority to apply signatures to test documents. The signed documents will be shared electronically and evaluated to assess the security and trustworthiness of the electronic signatures. The pilot aims to identify the lowest cost digital signature options and evaluate their potential benefits for authenticating online assessments.
Document verification using blockchain technology is yet another generic that got recently explored. bloctick is one such application that helps you to ascertain the integrity of your records.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data
modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
Blockchain for Education: Lifelong Learning Passport. Wolfgang Gräther & otherseraser Juan José Calderón
Blockchain for Education: Lifelong Learning Passport
Wolfgang Gräther
Fraunhofer FIT
Sankt Augustin, Germany
graether@fit.fraunhofer.de
Sabine Kolvenbach
Fraunhofer FIT
Sankt Augustin, Germany
kolvenbach@fit.fraunhofer.de
Rudolf Ruland
Fraunhofer FIT
Sankt Augustin, Germany
rudolf.ruland@fit.fraunhofer.de
Julian Schütte
Fraunhofer AISEC
Garching, Germany
schuette@aisec.fraunhofer.de
Christof Ferreira Torres
University of Luxembourg
Luxembourg
christof.torres@uni.lu
Florian Wendland
Fraunhofer AISEC
Garching, Germany
wendland@aisec.fraunhofer.de
Blockchain Architecture to Higher Education Systems de Palanivel Kuppusamy del Department of Computer Science de la Pondicherry University.
ABSTRACT:
The blockchain is an emerging technology that serves as an immutable ledger, which allows transactions to take place in a decentralized manner. It has become a publicly available infrastructure for building decentralized applications and achieving interoperability. Blockchain-based applications ensure transparency and trust between all parties involved in the interaction. The blockchain also makes blockchain technology-based services interest to the education sector. Nowadays, educational organizations focus on online education and propose to create a system based on educational smart contracts in a public ledger. This public ledger will be shared between major offline educational institutes around the world. From a software architecture perspective, blockchain enables new forms of distributed software architectures across a large network of untrusted participants. The objective of this article is to apply blockchain technology in learning solutions and to propose a blockchain architecture to e-Learning solutions in Higher Education Systems. The proposed architecture exploits the benefits of the blockchain and offering security, anonymity, longevity, integrity, transparency, immutability and global ecosystem simplification, in order to create a globally trusted higher education credit system.
Baccalaureate Generalist – Physical Assessment Reflection
Description: The baccalaureate-graduate nurse reflects upon the learning and growth that occurs
in areas of previous knowledge.
Course Competency: 4) Synthesize assessment findings using the Digital Clinical Experience
(DCE) and in written format using standardized terminology.
QSEN Competencies: 1) Patient-Centered Care 3) Evidenced-Based Practice
BSN Essential IX
Area Gold
Mastery
Silver
Proficient
Bronze
Acceptable
Acceptable
Mastery not
Demonstrated
Reflection The presentation is
clear, focused, and
compelling – holds
the reader’s
attention. Includes
significant,
intriguing details –
the “Aha!”
moments are
supported by
specific examples
from the physical
assessment. When
appropriate, rich
use of figurative
language and
imagery to convey
ideas. Overall,
demonstrates depth
of thought and rich
use of language.
The presentation is
clear and focused
throughout.
Authentic and
convincing based
on experience or
learning from the
physical
assessment
Attempted to use
figurative language
and imagery (when
appropriate) Main
idea expanded,
well supported by
detail and evidence
The presentation is
fuzzy,
undeveloped,
rambling thoughts
outweigh focused
moments from the
physical
assessment. Makes
no attempt to use
figurative
language. Does not
support main ideas
with details and
evidence, brief
discussion.
Does not complete
reflection
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4… 1/5
%64
%6
%2
SafeAssign Originality Report
Summer 2020 - Cryptography (ISOL-535-50)(ISOL-535-51) - COMBINE… • Week5: Individual Project
%72Total Score: High riskBhanu Teja Posani
Submission UUID: 9945a555-5e7c-85c9-8ba3-631361567578
Total Number of Reports
1
Highest Match
72 %
Individual Project PKI.docx
Average Match
72 %
Submitted on
06/06/20
09:01 PM CDT
Average Word Count
794
Highest: Individual Project PKI.docx
%72Attachment 1
Institutional database (3)
Student paper Student paper Student paper
Internet (4)
jihuomm jihuomm wikipedia
bobylive
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 794
Individual Project PKI.docx
2 6 3
5 4 1
7
8
2 Student paper 6 Student paper 5 jihuomm
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4&course_id=_118722_1&download=true&includeDeleted=true&print=true&force=true
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4… 2/5
Source Matches (17)
Running head: PUBLIC KEY INFRASTRUCTURE 1
PUBLIC KEY INFRASTRUCT.
MULTI-LAYER DIGITAL VALIDATION OF CANDIDATE SERVICE APPOINTMENT WITH DIGITAL ...IJCNCJournal
Proposed work promotes a unique data security protocol for validating candidate’s service appointment. Process initiated with concealment of private share within the first segment of each region of the e-letter at commission’s server. This is governed by hash operations determining circular orientation of private share fragments and their hosted matrix intervals. Signed e-letter downloaded at the posted place is validated through same hash operations and public share. Candidate’s on spot taken fingerprint are concealed in two segments for each region of the eletter adopting similar hiding strategies. The copyright signature of posting place is similarly shielded on fourth segment of each region using hash operations. The certified e-letter is thoroughly validated at commission’s server and signatures stored justify authenticity of appointment and proper candidature at the posting place. The superior test results from wider angles establishes the efficacy of the proposed protocol over the existing approaches.
Document verification using blockchain technology is yet another generic that got recently explored. bloctick is one such application that helps you to ascertain the integrity of your records.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data
modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
Blockchain for Education: Lifelong Learning Passport. Wolfgang Gräther & otherseraser Juan José Calderón
Blockchain for Education: Lifelong Learning Passport
Wolfgang Gräther
Fraunhofer FIT
Sankt Augustin, Germany
graether@fit.fraunhofer.de
Sabine Kolvenbach
Fraunhofer FIT
Sankt Augustin, Germany
kolvenbach@fit.fraunhofer.de
Rudolf Ruland
Fraunhofer FIT
Sankt Augustin, Germany
rudolf.ruland@fit.fraunhofer.de
Julian Schütte
Fraunhofer AISEC
Garching, Germany
schuette@aisec.fraunhofer.de
Christof Ferreira Torres
University of Luxembourg
Luxembourg
christof.torres@uni.lu
Florian Wendland
Fraunhofer AISEC
Garching, Germany
wendland@aisec.fraunhofer.de
Blockchain Architecture to Higher Education Systems de Palanivel Kuppusamy del Department of Computer Science de la Pondicherry University.
ABSTRACT:
The blockchain is an emerging technology that serves as an immutable ledger, which allows transactions to take place in a decentralized manner. It has become a publicly available infrastructure for building decentralized applications and achieving interoperability. Blockchain-based applications ensure transparency and trust between all parties involved in the interaction. The blockchain also makes blockchain technology-based services interest to the education sector. Nowadays, educational organizations focus on online education and propose to create a system based on educational smart contracts in a public ledger. This public ledger will be shared between major offline educational institutes around the world. From a software architecture perspective, blockchain enables new forms of distributed software architectures across a large network of untrusted participants. The objective of this article is to apply blockchain technology in learning solutions and to propose a blockchain architecture to e-Learning solutions in Higher Education Systems. The proposed architecture exploits the benefits of the blockchain and offering security, anonymity, longevity, integrity, transparency, immutability and global ecosystem simplification, in order to create a globally trusted higher education credit system.
Baccalaureate Generalist – Physical Assessment Reflection
Description: The baccalaureate-graduate nurse reflects upon the learning and growth that occurs
in areas of previous knowledge.
Course Competency: 4) Synthesize assessment findings using the Digital Clinical Experience
(DCE) and in written format using standardized terminology.
QSEN Competencies: 1) Patient-Centered Care 3) Evidenced-Based Practice
BSN Essential IX
Area Gold
Mastery
Silver
Proficient
Bronze
Acceptable
Acceptable
Mastery not
Demonstrated
Reflection The presentation is
clear, focused, and
compelling – holds
the reader’s
attention. Includes
significant,
intriguing details –
the “Aha!”
moments are
supported by
specific examples
from the physical
assessment. When
appropriate, rich
use of figurative
language and
imagery to convey
ideas. Overall,
demonstrates depth
of thought and rich
use of language.
The presentation is
clear and focused
throughout.
Authentic and
convincing based
on experience or
learning from the
physical
assessment
Attempted to use
figurative language
and imagery (when
appropriate) Main
idea expanded,
well supported by
detail and evidence
The presentation is
fuzzy,
undeveloped,
rambling thoughts
outweigh focused
moments from the
physical
assessment. Makes
no attempt to use
figurative
language. Does not
support main ideas
with details and
evidence, brief
discussion.
Does not complete
reflection
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4… 1/5
%64
%6
%2
SafeAssign Originality Report
Summer 2020 - Cryptography (ISOL-535-50)(ISOL-535-51) - COMBINE… • Week5: Individual Project
%72Total Score: High riskBhanu Teja Posani
Submission UUID: 9945a555-5e7c-85c9-8ba3-631361567578
Total Number of Reports
1
Highest Match
72 %
Individual Project PKI.docx
Average Match
72 %
Submitted on
06/06/20
09:01 PM CDT
Average Word Count
794
Highest: Individual Project PKI.docx
%72Attachment 1
Institutional database (3)
Student paper Student paper Student paper
Internet (4)
jihuomm jihuomm wikipedia
bobylive
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 794
Individual Project PKI.docx
2 6 3
5 4 1
7
8
2 Student paper 6 Student paper 5 jihuomm
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4&course_id=_118722_1&download=true&includeDeleted=true&print=true&force=true
6/9/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=f7f1093c-c6e3-4336-9e91-0a5f0f58bce4… 2/5
Source Matches (17)
Running head: PUBLIC KEY INFRASTRUCTURE 1
PUBLIC KEY INFRASTRUCT.
MULTI-LAYER DIGITAL VALIDATION OF CANDIDATE SERVICE APPOINTMENT WITH DIGITAL ...IJCNCJournal
Proposed work promotes a unique data security protocol for validating candidate’s service appointment. Process initiated with concealment of private share within the first segment of each region of the e-letter at commission’s server. This is governed by hash operations determining circular orientation of private share fragments and their hosted matrix intervals. Signed e-letter downloaded at the posted place is validated through same hash operations and public share. Candidate’s on spot taken fingerprint are concealed in two segments for each region of the eletter adopting similar hiding strategies. The copyright signature of posting place is similarly shielded on fourth segment of each region using hash operations. The certified e-letter is thoroughly validated at commission’s server and signatures stored justify authenticity of appointment and proper candidature at the posting place. The superior test results from wider angles establishes the efficacy of the proposed protocol over the existing approaches.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
1. PotsPan Project Workpackage 3
Institutional Document Management Pilot
1. Overview and Planning
Workpackage 3 of the JISC PotsPan project was to pilot the use of digital signatures with
management and administrative documents at Swansea Metropolitan University in the context of its
merger with University of Wales Trinity Saint David during the project period. The intention was to
explore the benefits of electronic signatures on documents that needed to be shared on multiple
sites. The original Workpackage specification can be seen in Appendix A.
The merger took place in October 2012 and the new institution is now engaged in a management
planning process that aims to have a fully integrated system in place by mid 2013. Understandably,
the new management document systems that will accompany this process have yet to be designed
and agreed. As a consequence, to meet the objectives of Workpackage 3, a document management
system needed to be chosen that would anticipate future operational needs and be of use to both
the new institution and the wider JISC community.
An expectation of future HE delivery strategies is that online blended and distance learning will
become an increasingly important component. The authentication of assessment documents
submitted remotely online has been a contentious issue1 and many reviews of potential solutions
and new methods have been published2,3. Swansea Metropolitan (the name is retained in the
merged university structure) is currently considering the validation of online distance learning
courses. It therefore seemed both appropriate and potentially valuable to focus the digital signature
pilot on this management issue.
An additional advantage that this Workpackage brings to the project is the opportunity to further
explore the acceptable use of electronic signatures. As noted in other project documents, the use of
a digital pen for signatures in the WBL administrative system was a compromise solution that met
EU audit requirements for a handwritten signature whilst enabling a fully digitised document system
to be established. The proposed Swansea Metropolitan pilot for authenticating online assessment is
not constrained in this way and presents an opportunity to take the electronic signature agenda
forward.
2. Electronic Signatures
Secure electronic signatures are accepted for financial and business transactions globally4 and
virtually any level of security can be included in document management workflows5. Adobe
1
Weller, M. (2002) Assessment Issues on a Web Based Course. Assessment and Evaluation in Higher Education,
vol 7, no. 2. pp109-116.
2
Toole, A. M. (2001) Assessment Authentication for On-line Learning. Professors & Heads of Engineering
Conference. Millennium Stadium, Cardiff.
3
Toole, A. M. (2002) On-line Assessment, Authentication and the design of a VLE. UCLES Seminar Series. The
University Centre, Cambridge.
4
Toole, A. M. (2012) Making Your Mark – Digital Signatures. JISC Innovating e-Learning Online Conference.
November 2012.
5
Adobe Systems Inc. (2011) Digital Signatures Enterprise User Guide. [online]. Available at:
http://www.adobe.com/devnet-docs/acrobatetk/tools/DigSig/Acrobat_DigSig_WorkflowGuide.pdf
2. summarise the capability well in their introduction to the use of electronic signatures6 using their
Acrobat PDF authoring application:
Digital signature capabilities allow authors to set up a secure signing environment and create simple
documents and complex forms with one or more fields. Document authors can design documents
with multiple signature fields each with unique behavioural characteristics and appearances.
A signed field can lock other fields so that signed data can’t be changed, and authors can force
certain signature fields to be a required part of a workflow. Attention to signature field design and
configuration can help make the document “do the right thing” when someone receives it as well as
control what that person can and cannot do with it.
Similarly, the Open Office suite of open source office applications includes the ability to add digital
signatures (and encrypt entire documents) in a secure way. They provide a number of application
scenarios7 including one that is entirely relevant to this case study:
Scenario: Education: Signing and encrypting documents in the education area is interesting,
because it can replace the paper process of correcting dissertations, etc. Students would send their
signed dissertations to professors, who would make annotation, sign these annotation and send the
signed document back to the student.
Product Requirement 1: Sign Complete Open Office Documents;
Product Requirement 2: Encrypt complete documents;
Product Requirement 3: Protect content via password and allow to add annotations (comments) or
tracked changes only;
Product Requirement 4: Sign tracked changes or annotations.
Both Adobe and Open Office enable very similar degrees of security to be applied to their
documents and electronic signature systems. The difference between them is that Adobe is a
commercial product and Open Office is an open source software application and free to use. Cost
will clearly be an important consideration for institutions, and the students using the system, in the
choice of software to adopt.
3. Electronic Signature Security
The basic features of a secure electronic signature system is that it should be able to confirm
ownership of the document, that the signatory was authorised to sign the document and that the
document has not been changed since the signature was applied. Typically the systems will also
identify the computer used to create the document and the date and time the signature was added.
There are a number of systems that achieve this, but one of the most secure involves asymmetric
public/private key encryption where only the owner with the private key can encrypt the
signature/document but anyone with the linked public key can verify the authenticity of the digital
signature/document when they open it.
A further element of security in the system is the use of a third party Certification Authority (CA) that
generates the public and private key certificates. The private key certificate is held on the owners’
computer and ensures that the encrypted data includes verification information that is recognised
by the receiving computer(s) with the public key. If any aspect of the document and signature
security is not verified, then a ‘not valid’ alert will be shown.
As with the software suppliers, there are both commercial and freely available CA providers. Clearly
there must be complete trust by all users in the integrity and security of the provider chosen.
However, as noted earlier, cost is clearly an issue for the institution and the students and this
6
Ibid. P 11.
7
Loehmann, F. (2004) Electronic Signatures and Encryption GUI. [online]. Available at:
http://bcn.boulder.co.us/~neal/i2/OpenOffice_Electronic_Signatures_and_Security.pdf
3. particular evaluation exercise will assess the information from service users in identifying a suitable
free CA service.
For the purposes of the PotsPan project only the electronic signature process will be looked at in
detail, although references to full document encryption will be made where relevant. The general
objective is to identify and test the lowest cost options available and for that reason the Open Office
software application will be used and a choice made from the free CA providers available.
4. Electronic Signatures Pilot Plan
The plan for piloting the use of electronic signatures on documents will involve choosing a CA
provider and creating digital authentication certificates, installing the certificates on the computer
creating the documents, creating of a range of documents using Open Office software and applying
electronic signatures to those documents. The documents will be then transmitted electronically and
an assessment made of the validity of the electronic signatures received and the trust attributable to
them. The pilot will conclude with a further assessment of their use, based on evidence gained
during the exercise, on the value electronic signatures would bring to the authentication of online
assessment submissions.
Implementation of the plan will therefore include:
Identifying a free Certification Authority service, registering as a user and completing all the
security procedures for the creation of authenticated certificates;
Installing the certificates on the PC to be used to create and sign the documents using the
Microsoft Management Console;
Create test documents using Open Office Writer and use the Digital Signatures function to
add certificated electronic signatures;
Send the documents electronically and test the received documents for validity against the
security criteria applied;
Repeat the exercise using assessment cover sheets attached to student assignments
submitted online using Moodle.
The pilot will conclude with a case study based report for inclusion with the JISC PotsPan project
deliverables.
Tony Toole
November 2012
4. Appendix A: Workpackage 3 Specification
PotsPan Project Workpackages
Workpackage 3: Institutional WBL Document Management Pilot
Pilot Institution: Swansea Metropolitan University
Primary Contact: Kathryn David, Head of Commercial Services
Workpackage Specification:
WORKPACKAGE 3: Institutional WBL Document Start Finish Action (deliverables indicated in bold) Milestone Responsibility
Management Pilot
Objective: To implement and evaluate the digital
signature system for distributed institutional
document management, particularly in support of
online Work Based Learning provision
1. Digital pen systems procurement & testing 01.06.2012 31.07.2012 Completed testing exercise and report TT
indicating recommended system.
2. Digital document management system review 01.08.2012 30.08.2012 Completed document review. TT, KD, NP
3. JISC WBL toolkit evaluation & testing 01.09.2012 31.10.2012 Mapping of the JISC WBL toolkit process 31.10.2012 TT, KD, WBL
to SMU WBL delivery. Report & staff
recommendations.
4. Trial of electronic signature systems in online 01.10.2012 21.12.2012 Completed evaluation and test report on TT, KD, WBL
WBL document administration & management electronic signature usage in the WBL staff
documentation system.
5. Online WBL document electronic signature 07.01.2013 26.04.2013 WBL stakeholder workshop and report 26.04.2013 TT, KD
system refinement, evaluation & reporting on digital document management.