Refine
H-BRS Bibliography
- no (1295) (remove)
Departments, institutes and facilities
Document Type
- Article (628)
- Conference Object (508)
- Part of a Book (59)
- Report (22)
- Lecture (16)
- Book (monograph, edited volume) (14)
- Doctoral Thesis (12)
- Patent (7)
- Conference Proceedings (6)
- Master's Thesis (6)
Year of publication
Language
- English (1295) (remove)
Keywords
- ENaC (9)
- Entrepreneurship (7)
- Malus domestica (7)
- Culture (6)
- E-Learning (6)
- apoptosis (6)
- sustainability (6)
- Mal d 1 (5)
- OER (5)
- Cloud (4)
„from stable to table“
(2008)
XML Encryption and XML Signature are fundamental security standards forming the core for many applications which require to process XML-based data. Due to the increased usage of XML in distributed systems and platforms such as in SOA and Cloud settings, the demand for robust and effective security mechanisms increased as well. Recent research work discovered, however, substantial vulnerabilities in these standards as well as in the vast majority of the available implementations. Amongst them, the so-called XML Signature Wrapping attack belongs to the most relevant ones. With the many possible instances of this attack type, it is feasible to annul security systems relying on XML Signature and to gain access to protected resources as has been successfully demonstrated lately for various Cloud infrastructures and services. This paper contributes a comprehensive approach to robust and effective XML Signatures for SOAP-based Web Services. An architecture is proposed, which integrates the r equired enhancements to ensure a fail-safe and robust signature generation and verification. Following this architecture, a hardened XML Signature library has been implemented. The obtained evaluation results show that the developed concept and library provide the targeted robustness against all kinds of known XML Signature Wrapping attacks. Furthermore the empirical results underline, that these security merits are obtained at low efficiency and performance costs as well as remain compliant with the underlying standards.
This paper describes a codesign environment based on the WWW (World Wide Web) and its implementation. Tool invocations and their respective results are linked using hypertext documents. We show how to configure a WWW browser for spawning design tools and how frequent tasks like documentation generation and retrieval are facilitated. The design flow can be adopted to the given application very easily. In addition we introduce the concept of a work flow called ‘design by documentation’. A WWW link to the results is given and experience using it in a codesign project is described.
Routing Attacks are a serious threat to communication in tactical MANETs. TOGBAD is a centralised approach, using topology graphs to detect such attacks. In this paper, we present TOGBAD's newly added wormhole detection capability. It is an adaptation of a wormhole detection method developed by Hu et al. This method is based on nodes' positions. We adapted it to the specific properties of tactical environments. Furthermore, we present simulation results which show TOGBAD's performance regarding the detection of wormhole attacks.
The ability to breathe air represents a fundamental step in vertebrate evolution that was accompanied by several anatomical and physiological adaptations. The morphology of the air-blood barrier is highly conserved within air-breathing vertebrates. It is formed by three different plies, which are represented by the alveolar epithelium, the basal lamina, and the endothelial layer. Besides these conserved morphological elements, another common feature of vertebrate lungs is that they contain a certain amount of fluid that covers the alveolar epithelium. The volume and composition of the alveolar fluid is regulated by transepithelial ion transport mechanisms expressed in alveolar epithelial cells. These transport mechanisms have been reviewed extensively. Therefore, the present review focuses on the properties and functional significance of the alveolar fluid. How does the fluid enter the alveoli? What is the fate of the fluid in the alveoli? What is the function of the alveolar fluid in the lungs? The review highlights the importance of the alveolar fluid, its volume and its composition. Maintenance of the fluid volume and composition within certain limits is critical to facilitate gas exchange. We propose that the alveolar fluid is an essential element of the air-blood barrier. Therefore, it is appropriate to refer to this barrier as being formed by four plies, namely (1) the thin fluid layer covering the apical membrane of the epithelial cells, (2) the epithelial cell layer, (3) the basal membrane, and (4) the endothelial cells.
In education, finding the appropriate learning pace that fits to the members of a large group is a challenging task. This becomes especially evident when teaching multidisciplinary subjects such as epidemiology in medicine or computer science in most study programs, since lecturers have to face a very heterogeneous state of previous knowledge. Approaching this issue requires an individual supervision of each and every student, which is obviously bounded by the available resources. Moreover, when referring back to the second example, writing computer programs requires a complex installation and configuration of development tools. Many beginning programmers already become stuck at this entry stage. This paper introduces WHELP, a Web-based Holistic E-Learning Platform, which provides an integrated environment enabling the learning and teaching of computer science topics without the need to install any software. Moreover, WHELP includes an interactive feedback system for each programming exercise, where lecturers or tutors can supply comments, improvements, code assistance or tips helping the students to accomplish their tasks. Furthermore, WHELP offers a statistical analysis module as well as a real-time classroom polling system both promoting an overview of the state of knowledge of a course. In addition to that, WHELP enables collaborative working including code-sharing and peer-to-peer learning. This feature enables students to work on exercises simultaneously at distinct places. WHELP has been successfully deployed in the winter term 2013 at the Cologne University of Applied Sciences supporting the 120 students and 3 lecturers to learn and teach basic topics of computer science in an engineering study program.
This paper aspires to develop a deeper understanding of the sharing/collaborative/platform economy, and in particular of the technical mechanisms upon which the digital platforms supporting it are built. In surveying the research literature, the paper identifies a gap between studies from economical, social or socio-technical angles, and presentations of detailed technical solutions. Most cases study larger, ‘monotechnological’ platforms, rather than local platforms that lend components from several technologies. Almost no literature takes a design perspective. Rooted in Sharing & Caring, an EU COST Action (network), the paper presents work to systematically map out functionalities across domains of the sharing economy. The 145 technical mechanisms we collected illustrate how most platforms are depending on a limited number of functionalities that lack in terms of holding communities together. The paper points to the necessity of a better terminology and concludes by discussing challenges and opportunities for the design of future and more inclusive platforms.
Software development is a complex task. Merely focussing on functional requirements is not sufficient any more. Developers are responsible to take many non-functional requirements carefully into account. Security is amongst the most challenging, as getting it wrong will result in a large user-base being potentially at risk. A similar situation exists for administrators. Security defaults have been put into place here to encounter lacking security controls. As first attempts to establish security by default in software development are flourishing, the question on their usability for developers arises.
In this paper we study the effectiveness and efficiency of Content Security Policy (CSP) enforced as security default in a web framework. When deployed correctly, CSP is a valid protection mean in a defence-in-depth strategy against code injection attacks. In this paper we present a first qualitative laboratory study with 30 participants to discover how developers deal with CSP when deployed as security default. Our results emphasize that the deployment as security default has its benefits but requires careful consideration of a comprehensive information flow in order to improve and not weaken security. We provide first insights to inform research about aiding developers in the creation of secure web applications with usable security by default.
This article analyzes how humanitarian and/or development organizations acting as intermediaries between scientists and vulnerable populations aim to make environmental changes visible while trying to meet local needs and demands for sustainable livelihoods. Based on an in-depth organizational case study in Southern Thailand, the research analyses the use of visualization tools to foster environmental knowledge and literacy while supporting both policymaking as well as citizen engagement. Drawing on insights from sociology of organizations, the study discusses the organizational reasons for the use of visualization tools, outlining the underlying coercive, mimetic and normative pressures that facilitate their proliferation in the context of environmental communication. The results show that both the participatory approach as well as the use of audiovisual and digital tools to communicate project goals and results have become indispensable and institutionalized tools in the organizational field of humanitarian and development aid. In this context, organizations have become intermediaries and translators between ‘climate risk’ scientists and ‘at risk’ people, thus, facilitating environmental communication. The results show that questions of trust and ownership of ideas play an important role in the context of livelihood related projects linked to climate change adaptation. In this context, not only does the style and content of communication, but also the relationship between the parties who communicate, have an impact upon the success or failure of managing options in climate change adaptation.
The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2016), held between November 13-17, 2016 - Barcelona, Spain, continued the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies and applications.
Introduction: Antimicrobial resistance (AMR) has emerged as one of the leading threats to public health. AMR possesses a multidimensional challenge that has social, economic, and environmental dimensions that encompass the food production system, influencing human and animal health. The One Health approach highlights the inextricable linkage and interdependence between the health of people, animals, agriculture, and the environment. Antibiotic use in any of these One Health areas can potentially impact the health of other areas. There is a dearth of evidence on AMR from the natural environment, such as the plant-based agriculture sector. Antibiotics, antibiotic-resistant bacteria (ARB), and related AMR genes (ARGs) are assumed to present in the natural environment and disseminate resistance to fresh produce/vegetables and thus to human health upon consumption. Therefore, this study aims to investigate the role of vegetables in the spread of AMR through an agroecosystem exploration from a One Health perspective in Ahmedabad, India.
Protocol: The present study will be executed in Ahmedabad, located in Gujarat state in the Western part of India, by adopting a mixed-method approach. First, a systematic review will be conducted to document the prevalence of ARB and ARGs on fresh produce in South Asia. Second, agriculture farmland surveys will be used to collect the general farming practices and the data on common vegetables consumed raw by the households in Ahmedabad. Third, vegetable and soil samples will be collected from the selected agriculture farms and analyzed for the presence or absence of ARB and ARGs using standard microbiological and molecular methods.
Discussion: The analysis will help to understand the spread of ARB/ARGs through the agroecosystem. This is anticipated to provide an insight into the current state of ARB/ARGs contamination of fresh produce/vegetables and will assist in identifying the relevant strategies for effectively controlling and preventing the spread of AMR.
This paper describes the development of a Pedelec controller whose performance level (PL) conforms to European standard on safety of machinery [9] and whose soft- ware is verified to conform to EPAC standard [6] by means of a software verification technique called model checking. In compliance with the standard [9] the hardware needs to implement the required properties corresponding to categories “C” and “D”. The latter is used if the breaks are not able to bring the velomobile with a broken motor controller to a full stop. Therefore the controller needs to implement a test unit, which verifies the functionality of the components and, in case of an emergency, shuts the whole hardware down to prevent injuries of the cyclist. The MTTFd can be measured through a failure graph, which is the result of a FMEA analysis, and can be used to proof that the Pedelec controller meets the regulations of the system specification. The analysis of the system in compliance with [9] usually treats the software as a black box thus ignoring its inner workings and validating its correctness by means of testing. In this paper we present a temporal logic specification according to [6], based on which the software for the Pedelec controller is implemented, and verify instead of only testing its functionality. By means of model checking [1] we proof that the software fulfills all requirements which are regulated by its specification.
UTRAN Internet Access
(1999)
Scientific or statistical research has long been the domain of dedicated programming languages such as R, SPSS or SAS. A few years other competitors entered the arena, among them Python with its powerful SciPy package. The following article introduces SciPy by applying a small subset of its functionality to a well-known dataset.