Refine
Departments, institutes and facilities
- Fachbereich Informatik (42)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (35)
- Fachbereich Ingenieurwissenschaften und Kommunikation (20)
- Fachbereich Angewandte Naturwissenschaften (18)
- Institut für Cyber Security & Privacy (ICSP) (18)
- Institute of Visual Computing (IVC) (13)
- Fachbereich Wirtschaftswissenschaften (11)
- Institut für Detektionstechnologien (IDT) (5)
- Institut für Verbraucherinformatik (IVI) (5)
- Fachbereich Sozialpolitik und Soziale Sicherung (3)
Document Type
- Conference Object (112) (remove)
Year of publication
- 2017 (112) (remove)
Has Fulltext
- no (112) (remove)
Keywords
- Aerodynamics (2)
- Object recognition (2)
- Virtual Reality (2)
- discrete optimisation (2)
- dispatching problem (2)
- massively parallel calculations (2)
- surrogate modeling (2)
- 3D design (1)
- 6LoWPAN (1)
- Active locomotion (1)
- Adaptation of Software (1)
- AgroTICs (1)
- Alternatives (1)
- Amplifiers (1)
- Approximated Jacobian (1)
- Architectural Patterns (1)
- Automotive UI (1)
- Benchmarking (1)
- Bluetooth (1)
- CPU (1)
- CSR5BC (1)
- Car Management (1)
- Chemicals (1)
- Chromatography (1)
- Collaboration (1)
- Coloured pointclouds (1)
- Competencies (1)
- Computer Graphics (1)
- Concurrent Kleene Algebra (1)
- Connected Car Services (1)
- Containerization (1)
- Cooperative Awareness Message (1)
- Corporate Bodies (1)
- Defense and security (1)
- Design (1)
- Design patterns (1)
- Diodes (1)
- Distributed rendering (1)
- Docker (1)
- Domestic robotics (1)
- Domestic robots (1)
- E-waste (1)
- Economic Development (1)
- Education (1)
- Elderly (1)
- Electrical and Electronic Equipment (1)
- Entrepreneurial Education (1)
- Ethernet (1)
- Evolutionary algorithms (1)
- Explosives (1)
- Eye Tracking (1)
- Frontend architecture (1)
- Fully Autonomous Driving (1)
- Fusion (1)
- GPU (1)
- Gaze Behavior (1)
- HCSS (1)
- Head-mounted Display (1)
- Host-Based Code Injection Attacks (1)
- Illumination algorithms (1)
- Industrial robots (1)
- Innovativeness (1)
- Intelligent virtual agents (1)
- Intercultural Communication (1)
- Inventory (1)
- Kunststoffhohlkörper (1)
- LGCSR (1)
- Laser drilling (1)
- Laser induced breakdown spectroscopy (1)
- Laws of programming (1)
- Living Lab (1)
- LoRaWAN (1)
- Low power (1)
- MAP-Elites (1)
- MSMEs (1)
- Machine Learning (1)
- Machine learning (1)
- Malware (1)
- Materialbeschreibung (1)
- Memory forensics (1)
- Metals (1)
- Microservices (1)
- Mobility (1)
- Modalities (1)
- Model-based fault detection and isolation (1)
- Model-driven Development (1)
- Motivation (1)
- Multi-Tenant Application (1)
- Multimodal (1)
- Multiuser (1)
- NETCONF (1)
- OpenDaylight (1)
- OpenFlow (1)
- Optimisation 3D (1)
- Participatory Design (1)
- Peer teaching (1)
- Produktsimulation (1)
- Project Management (1)
- Pseudonym Concept (1)
- Public Transport (1)
- Qualitative Study (1)
- Qualitative research (1)
- Quality Diversity (1)
- RGB-D data (1)
- Ray Tracing (1)
- Redes de Sensores inalámbricos (1)
- Refinement (1)
- Requirements analysis (1)
- Resource Planning (1)
- Robot competitions (1)
- Rosenbrock-Wanner Methods (1)
- SDN (1)
- Second Cockpit (1)
- Second Screen (1)
- Semantic models (1)
- Sensors (1)
- Serious Games (1)
- Service-Oriented Architecture (1)
- Smart Home (1)
- Social Learning (1)
- Social Virtual Reality (1)
- Software and Architecture (1)
- SpMV (1)
- Sparse matrix format (1)
- Study Island (1)
- Surrogate Modelling (1)
- Synthetic perception (1)
- Textureless objects (1)
- Theory of Rooted Trees (1)
- Tiled-display walls (1)
- Touchscreen interaction (1)
- Trace algebra (1)
- Transparency (1)
- Transportation (1)
- UAV teleoperation (1)
- Unattended Train Operation (1)
- Unifying theories (1)
- Usability (1)
- User Acceptance (1)
- User Experience (1)
- User Interface Design (1)
- VR system design (1)
- Variability Management (1)
- Vehicle-to-Vehicle Communication (1)
- Verarbeitungsprozess (1)
- Verbesserungspotenzial (1)
- Virtual Environments (1)
- Virtual attention (1)
- W-Methods (1)
- WSN (1)
- Web (1)
- Xeon Phi knights landing (1)
- YANG (1)
- Youth Employability (1)
- ZigBee (1)
- activation function (1)
- bagging (1)
- biological object (1)
- bloat (1)
- brute force algorithm (1)
- calculations modeling (1)
- calculations modelling (1)
- cancer cells detection (1)
- classroom interaction (1)
- condition monitoring (1)
- diagnostic bond graphs (1)
- differential-algebraic equations (1)
- digital design (1)
- dynamic experiment (1)
- dynamic programming (1)
- e-learning (1)
- energy harvesting (1)
- energy monitoring (1)
- evolutionary illumination (1)
- exploration (1)
- eye-tracking (1)
- factor load (1)
- foveated rendering (1)
- generation of ARRs (1)
- generative design (1)
- graphics processing units (1)
- haptics (1)
- heterogeneous networks (1)
- ideal switches (1)
- information parameter (1)
- interdisciplinary projects (1)
- large classrooms (1)
- mode switching LTI models (1)
- motion cueing (1)
- motivating first year students (1)
- natural user interface (1)
- neuroevolution (1)
- parallel computing (1)
- parallel difference visualization (1)
- problem based learning (1)
- professors as tutors (1)
- regression (1)
- remote-controlled robots (1)
- systematic review (1)
- textbooks (1)
- videos (1)
- virtual locomotion (1)
- virtual reality (1)
- visuohaptic feedback (1)
- wireless networks’ topology (1)
- wireless sensors (1)
Usable security puts the users into the center of cyber security developments. Software developers are a very specific user group in this respect, since their points of contact with security are application programming interfaces (APIs). In contrast to APIs providing functionalities of other domains than security, security APIs are not approachable by habitual means. Learning by doing exploration exercises is not well supported. Reasons for this range from missing documentation, tutorials and examples to lacking tools and impenetrable APIs, that makes this complex matter accessible. In this paper we study what abstraction level of security APIs is more suitable to meet common developers’ needs and expectations. For this purpose, we firstly define the term security API. Following this definition, we introduce a classification of security APIs according to their abstraction level. We then adopted this classification in two studies. In one we gathered the current coverage of the distinct classes by the standard set of security functionality provided by popular software development kits. The other study has been an online questionnaire in which we asked 55 software developers about their experiences and opinion in respect of integrating security mechanisms into their coding projects. Our findings emphasize that the right abstraction level of a security API is one important aspect to consider in usable security API design that has not been addressed much so far.