20,622 research outputs found

    Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

    Full text link
    Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today, the average end user often struggles with understanding and using security mecha-nisms. Other security mechanisms are simply annoying for end users. As the overall security of any system is only as strong as the weakest link in this system, bad usability of IT security mechanisms may result in operating errors, resulting in inse-cure systems. Buying decisions of end users may be affected by the usability of security mechanisms. Hence, software provid-ers may decide to better have no security mechanism then one with a bad usability. Usability of IT security mechanisms is one of the most underestimated properties of applications and sys-tems. Even IT security itself is often only an afterthought. Hence, usability of security mechanisms is often the after-thought of an afterthought. This paper presents some guide-lines that should help software developers to improve end user usability of security-related mechanisms, and analyzes com-mon applications based on these guidelines. Based on these guidelines, the usability of email encryption is analyzed and an email encryption solution with increased usability is presented. The approach is based on an automated key and trust man-agement. The compliance of the proposed email encryption solution with the presented guidelines for usable security mechanisms is evaluated

    The development of the professionalism of adult educators: a biographical and learning perspective

    Full text link
    To investigate the development of the professionalism of adult educators, we compare individuals’ narratives of their professional work at different times in their biographies. Using data from a qualitative longitudinal study, the paper includes two case studies through which we show phases of learning in the development of professionalism. We reconstruct forms and meanings of learning in this process. The study allows insights into differences in professional learning during the life course and the influence of institutional and social context in the development of professionalism. (DIPF/orig.

    Heteroclinic path to spatially localized chaos in pipe flow

    Full text link
    In shear flows at transitional Reynolds numbers, localized patches of turbulence, known as puffs, coexist with the laminar flow. Recently, Avila et al., Phys. Rev. Let. 110, 224502 (2013) discovered two spatially localized relative periodic solutions for pipe flow, which appeared in a saddle-node bifurcation at low speeds. Combining slicing methods for continuous symmetry reduction with Poincar\'e sections for the first time in a shear flow setting, we compute and visualize the unstable manifold of the lower-branch solution and show that it contains a heteroclinic connection to the upper branch solution. Surprisingly this connection even persists far above the bifurcation point and appears to mediate puff generation, providing a dynamical understanding of this phenomenon.Comment: 10 pages, 5 figure

    Secure Scrum: Development of Secure Software with Scrum

    Full text link
    Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects. In traditional software projects, security issues require detailed planning in an initial planning phase, typically resulting in a detailed security analysis (e.g., threat and risk analysis), a security architecture, and instructions for security implementation (e.g., specification of key sizes and cryptographic algorithms to use). Agile software development methods like Scrum are known for reducing the initial planning phases (e.g., sprint 0 in Scrum) and for focusing more on producing running code. Scrum is also known for allowing fast adaption of the emerging software to changes of customer wishes. For security, this means that it is likely that there are no detailed security architecture or security implementation instructions from the start of the project. It also means that a lot of design decisions will be made during the runtime of the project. Hence, to address security in Scrum, it is necessary to consider security issues throughout the whole software development process. Secure Scrum is a variation of the Scrum framework with special focus on the development of secure software throughout the whole software development process. It puts emphasis on implementation of security related issues without the need of changing the underlying Scrum process or influencing team dynamics. Secure Scrum allows even non- security experts to spot security issues, to implement security features, and to verify implementations. A field test of Secure Scrum shows that the security level of software developed using Secure Scrum is higher then the security level of software developed using standard Scrum.Comment: The Ninth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2015, Venice, Italy, 201

    Relaminarization of pipe flow by means of 3d-printed shaped honeycombs

    Full text link
    Based on a novel control scheme, where a steady modification of the streamwise velocity profile leads to complete relaminarization of initially fully turbulent pipe flow, we investigate the applicability and usefulness of custom-shaped honeycombs for such control. The custom-shaped honeycombs are used as stationary flow management devices which generate specific modifications of the streamwise velocity profile. Stereoscopic particle image velocimetry and pressure drop measurements are used to investigate and capture the development of the relaminarizing flow downstream these devices. We compare the performance of straight (constant length across the radius of the pipe) honeycombs with custom-shaped ones (variable length across the radius). An attempt is made to find the optimal shape for maximal relaminarization at minimal pressure loss. The maximum attainable Reynolds number for total relaminarization is found to be of the order of 10.000. Consequently the respective reduction in skin friction downstream of the device is almost by a factor of 5. The break-even point, where the additional pressure drop caused by the device is balanced by the savings due to relaminarization and a net gain is obtained, corresponds to a downstream stretch of distances as low as approx.\ 100 pipe diameters of laminar flow

    Ultrasonic motion analysis system - measurement of temporal and spatial gait parameters

    Get PDF
    The duration of stance and swing phase and step and stride length are important parameters in human gait. In this technical note a low-cost ultrasonic motion analysis system is described that is capable of measuring these temporal and spatial parameters while subjects walk on the floor. By using the propagation delay of sound when transmitted in air, this system is able to record the position of the subjects' feet. A small ultrasonic receiver is attached to both shoes of the subject while a transmitter is placed stationary on the floor. Four healthy subjects were used to test the device. Subtracting positions of the foot with zero velocity yielded step and stride length. The duration of stance and swing phase was calculated from heel-strike and toe-off. Comparison with data obtained from foot contact switches showed that applying two relative thresholds to the speed graph of the foot could reliably generate heel-strike and toe-off. Although the device is tested on healthy subjects in this study, it promises to be extremely valuable in examining pathological gait. When gait is asymmetrical, walking speed is not constant or when patients do not completely lift their feet, most existing devices will fail to correctly assess the proper gait parameters. Our device does not have this shortcoming and it will accurately demonstrate asymmetries and variations in the patient's gait. As an example, the recording of a left hemiplegic patient is presented in the discussion. (C) 2002 Elsevier Science Ltd. All rights reserved

    Some comments on the inverse problem of pure point diffraction

    Full text link
    In a recent paper, Lenz and Moody (arXiv:1111.3617) presented a method for constructing families of real solutions to the inverse problem for a given pure point diffraction measure. Applying their technique and discussing some possible extensions, we present, in a non-technical manner, some examples of homometric structures.Comment: 6 pages, contribution to Aperiodic 201
    corecore