1,456 research outputs found

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    Integrating BON and Object-Z.

    Get PDF
    A significant limitation with object-oriented formal specification languages, such as Object-Z, is that they lack development and management processes, which can be used to guide the production of reliable, robust object-oriented systems. An integration of an object-oriented methodology, BON, and Object-Z is presented in order to add an industrially validated development process to Object-Z. An extensible CASE tool for BON is also described that supports the integration with an Object-Z code generation engine

    Promoting Physical Activity in Low Income African Americans: Project LAPS

    Full text link
    Low income African Americans are at increased risk for physical inactivity and related chronic illnesses. Thus, effective interventions are needed to address these health disparities. The current study examined the efficacy of a home-based physical activity intervention among a low income African American sample with high rates of chronic illnesses (obesity, hypertension, diabetes, high cholesterol). Participants (n=214) were randomly assigned to either the home-based physical activity intervention (self-help print materials, five monthly newsletters, two telephone counseling sessions) or an attention control condition, which promoted healthy diet. Results indicated that the intervention did not produce significantly greater increases in physical activity from baseline to six months than the control group. Lessons learned from the current study include the importance of using proactive retention strategies with low income African American participants and taking into consideration the cultural relevance of the intervention

    Behaviour-Based Cheat Detection in Multiplayer Games with Event-B

    Get PDF
    Cheating is a key issue in multiplayer games as it causes unfairness which reduces legitimate users' satisfaction and is thus detrimental to game revenue. Many commercial solutions prevent cheats by reacting to speci c implementations of cheats. As a result, they respond more slowly to fast-changing cheat techniques. This work proposes a framework using Event-B to describe and detect cheats from server-visible game behaviours. We argue that this cheat detection is more resistant to changing cheat technique

    Game Development using Design-by-Contract.

    Get PDF

    Metamodel-based model conformance and multiview consistency checking

    Get PDF
    Model-driven development, using languages such as UML and BON, often makes use of multiple diagrams (e.g., class and sequence diagrams) when modeling systems. These diagrams, presenting different views of a system of interest, may be inconsistent. A metamodel provides a unifying framework in which to ensure and check consistency, while at the same time providing the means to distinguish between valid and invalid models, that is, conformance. Two formal specifications of the metamodel for an object-oriented modeling language are presented, and it is shown how to use these specifications for model conformance and multiview consistency checking. Comparisons are made in terms of completeness and the level of automation each provide for checking multiview consistency and model conformance. The lessons learned from applying formal techniques to the problems of metamodeling, model conformance, and multiview consistency checking are summarized
    corecore