20,622 research outputs found
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption
Nowadays, advanced security mechanisms exist to protect data, systems, and
networks. Most of these mechanisms are effective, and security experts can
handle them to achieve a sufficient level of security for any given system.
However, most of these systems have not been designed with focus on good
usability for the average end user. Today, the average end user often struggles
with understanding and using security mecha-nisms. Other security mechanisms
are simply annoying for end users. As the overall security of any system is
only as strong as the weakest link in this system, bad usability of IT security
mechanisms may result in operating errors, resulting in inse-cure systems.
Buying decisions of end users may be affected by the usability of security
mechanisms. Hence, software provid-ers may decide to better have no security
mechanism then one with a bad usability. Usability of IT security mechanisms is
one of the most underestimated properties of applications and sys-tems. Even IT
security itself is often only an afterthought. Hence, usability of security
mechanisms is often the after-thought of an afterthought. This paper presents
some guide-lines that should help software developers to improve end user
usability of security-related mechanisms, and analyzes com-mon applications
based on these guidelines. Based on these guidelines, the usability of email
encryption is analyzed and an email encryption solution with increased
usability is presented. The approach is based on an automated key and trust
man-agement. The compliance of the proposed email encryption solution with the
presented guidelines for usable security mechanisms is evaluated
The development of the professionalism of adult educators: a biographical and learning perspective
To investigate the development of the professionalism of adult educators, we compare individuals’ narratives of their professional work at different times in their biographies. Using data from a qualitative longitudinal study, the paper includes two case studies through which we show phases of learning in the development of professionalism. We reconstruct forms and meanings of learning in this process. The study allows insights into differences in professional learning during the life course and the influence of institutional and social context in the development of professionalism. (DIPF/orig.
Heteroclinic path to spatially localized chaos in pipe flow
In shear flows at transitional Reynolds numbers, localized patches of
turbulence, known as puffs, coexist with the laminar flow. Recently, Avila et
al., Phys. Rev. Let. 110, 224502 (2013) discovered two spatially localized
relative periodic solutions for pipe flow, which appeared in a saddle-node
bifurcation at low speeds. Combining slicing methods for continuous symmetry
reduction with Poincar\'e sections for the first time in a shear flow setting,
we compute and visualize the unstable manifold of the lower-branch solution and
show that it contains a heteroclinic connection to the upper branch solution.
Surprisingly this connection even persists far above the bifurcation point and
appears to mediate puff generation, providing a dynamical understanding of this
phenomenon.Comment: 10 pages, 5 figure
Secure Scrum: Development of Secure Software with Scrum
Nowadays, the use of agile software development methods like Scrum is common
in industry and academia. Considering the current attacking landscape, it is
clear that developing secure software should be a main concern in all software
development projects. In traditional software projects, security issues require
detailed planning in an initial planning phase, typically resulting in a
detailed security analysis (e.g., threat and risk analysis), a security
architecture, and instructions for security implementation (e.g., specification
of key sizes and cryptographic algorithms to use). Agile software development
methods like Scrum are known for reducing the initial planning phases (e.g.,
sprint 0 in Scrum) and for focusing more on producing running code. Scrum is
also known for allowing fast adaption of the emerging software to changes of
customer wishes. For security, this means that it is likely that there are no
detailed security architecture or security implementation instructions from the
start of the project. It also means that a lot of design decisions will be made
during the runtime of the project. Hence, to address security in Scrum, it is
necessary to consider security issues throughout the whole software development
process. Secure Scrum is a variation of the Scrum framework with special focus
on the development of secure software throughout the whole software development
process. It puts emphasis on implementation of security related issues without
the need of changing the underlying Scrum process or influencing team dynamics.
Secure Scrum allows even non- security experts to spot security issues, to
implement security features, and to verify implementations. A field test of
Secure Scrum shows that the security level of software developed using Secure
Scrum is higher then the security level of software developed using standard
Scrum.Comment: The Ninth International Conference on Emerging Security Information,
Systems and Technologies - SECURWARE 2015, Venice, Italy, 201
Relaminarization of pipe flow by means of 3d-printed shaped honeycombs
Based on a novel control scheme, where a steady modification of the
streamwise velocity profile leads to complete relaminarization of initially
fully turbulent pipe flow, we investigate the applicability and usefulness of
custom-shaped honeycombs for such control. The custom-shaped honeycombs are
used as stationary flow management devices which generate specific
modifications of the streamwise velocity profile. Stereoscopic particle image
velocimetry and pressure drop measurements are used to investigate and capture
the development of the relaminarizing flow downstream these devices. We compare
the performance of straight (constant length across the radius of the pipe)
honeycombs with custom-shaped ones (variable length across the radius). An
attempt is made to find the optimal shape for maximal relaminarization at
minimal pressure loss. The maximum attainable Reynolds number for total
relaminarization is found to be of the order of 10.000. Consequently the
respective reduction in skin friction downstream of the device is almost by a
factor of 5. The break-even point, where the additional pressure drop caused by
the device is balanced by the savings due to relaminarization and a net gain is
obtained, corresponds to a downstream stretch of distances as low as approx.\
100 pipe diameters of laminar flow
Ultrasonic motion analysis system - measurement of temporal and spatial gait parameters
The duration of stance and swing phase and step and stride length are important parameters in human gait. In this technical note a low-cost ultrasonic motion analysis system is described that is capable of measuring these temporal and spatial parameters while subjects walk on the floor. By using the propagation delay of sound when transmitted in air, this system is able to record the position of the subjects' feet. A small ultrasonic receiver is attached to both shoes of the subject while a transmitter is placed stationary on the floor. Four healthy subjects were used to test the device. Subtracting positions of the foot with zero velocity yielded step and stride length. The duration of stance and swing phase was calculated from heel-strike and toe-off. Comparison with data obtained from foot contact switches showed that applying two relative thresholds to the speed graph of the foot could reliably generate heel-strike and toe-off. Although the device is tested on healthy subjects in this study, it promises to be extremely valuable in examining pathological gait. When gait is asymmetrical, walking speed is not constant or when patients do not completely lift their feet, most existing devices will fail to correctly assess the proper gait parameters. Our device does not have this shortcoming and it will accurately demonstrate asymmetries and variations in the patient's gait. As an example, the recording of a left hemiplegic patient is presented in the discussion. (C) 2002 Elsevier Science Ltd. All rights reserved
Some comments on the inverse problem of pure point diffraction
In a recent paper, Lenz and Moody (arXiv:1111.3617) presented a method for
constructing families of real solutions to the inverse problem for a given pure
point diffraction measure. Applying their technique and discussing some
possible extensions, we present, in a non-technical manner, some examples of
homometric structures.Comment: 6 pages, contribution to Aperiodic 201
- …
