Security, Usability and Society

Conference seminar

Type of seminar:S3 4CP
Lecturer:Prof. Dr. Melanie Volkamer
Organisation:Stephan Neumann
Supervisors:Prof. Dr. Melanie Volkamer, Dr. Steffen Bartsch, Jurlind Budurushi, Maina Olembo, Stephan Neumann
First Meeting:23.10.2012, 14.15 (E102) [slides]
Requirements:Interest in interdisciplinary topics and research work, basic knowledge in Security
Registration (internal):Fill Form until 26.10.2012
Registration (TUCAN): passed
Formatting:Use LNCS MS Word or LaTeX template
Submission (Outline):21.12.2012 via EasyChair
Review (Outline):13.01.2013 via EasyChair
Presentations (Block Seminar):07./08.03.2013 (A213)
Submission (Full Paper):15.03.2013 via EasyChair
Number of participants:max. 20

General Information

The seminar will take place in form of a conference. The typical phases of a scientific publication will be followed through the example of a paper:

  • Submission (Abstract)
  • Review Process
  • Talk (General information, Schedule)

    • 1 person: 20 minutes + 5 minutes questions/answers
    • 2  persons: 30 minutes + 10 minutes questions/answers

  • Submission (Full Paper)

All presentations will take place on one day (two days if needed). This day will be organized similar to a talk or visit at a scientific conference. This format ensures that the preparation times are identical for all participants. We will meet all together only twice: to award topics/preliminary discussion and at the talks. Questions that arise during the work of the individual topics will be discussed with the respective supervisor in individual meetings. Further information is available at the preliminary discussion.

The slides from the "Presentation Skills" workshop can be found here.

For the presentations the following template has to be used: PPT. Please note the comments within the template and consider them for your own presentation

The best presentation will be awarded with a price.

Questions regarding your grade should be addressed to your own supervisor.

Teaching goals

Our everyday life moves more and more towards the Internet. E-business and e-banking have become the normality for a significant proportion of our society and further electronic processes begin to enter the field. While we already use the Internet for many activities like shopping, banking, gaming, and communicating with friends both in the private and business sector, the number of applications is still increasing. As prime example, electronic voting becomes an alternative or even substitution for traditional voting channels in many countries like Estonia or Norway. All these applications have in common that they are security-critical systems which need to meet many security properties from a technical point of view but which also need to be usable in a way that the implemented security is effective in practice and not only theoretically – and accepted by society.

The goal of this seminar is to better understand the challenges. Therefore, we offer topics, which

  • focus on the security properties in electronic voting [EV]
  • focus on the human and society factors in different security-critical areas and applications [HS]

Topics, Elaborations and Talks

There are two types of seminar topics: [L] means Literature Review, [S] means re-running a published study. You are welcome to suggest your own topic in one of the areas: until October 22, 2012. Please feel free to contact the corresponding contact person for further information about the topics. In the first meeting (October, 23), topics will be assigned.

  1. Secure Platform Problem in Electronc Voting - Comparing Code Voting with the Swiss approach [L][EV]

    • Contact Person: Melanie Volkamer
    • Number of students: 1-2 (BA, MA)
    • Language: German or English (Swiss document available only in German)

  2. Secrecy, Degree of Verifiability, and Adversary Model of E-Voting Schemes based on Code Voting [L][EV]

    • Contact Person: Jurlind Budurushi
    • Number of Students: 2
    • Language: German or English

  3. Coercion-resistant electronic voting [L][EV] (topic proposed by and assigned to Christian Feier)

    • Contact Person: Stephan Neumann
    • Number of students: 1-2
    • Language: German or English

  4. Security Analysis of the Swiss EVoting System [L][EV]

    • Contact Person: Melanie Volkamer
    • Number of students: 1
    • Language: German or English

  5. Comparison of the German, Belgian, Israeli, and Argentinean/Venezuelan e-voting systems [L][EV]

    • Contact Person: Jurlind Budurushi
    • Number of Students: 2
    • Language: German or English

  6. Risk Communication in Computer Security [L][EV][HS]
    • Contact Person: Maina Olembo
    • Number of students: 1
    • Language: English

  7. Social Engineering (SE) in companies - better understanding what is recommended, how to analyse [L][HS]

    • Contact Person: Melanie Volkamer
    • Number of students: 1 (BA, MA)
    • Language: German or English

  8. Security usability for software developers [L][HS]

    • Contact Person: Dr. Steffen Bartsch
    • Number of Students: 1
    • Language: German or English

  9. Collecting and Structuring Expert Knowledge on Security [L][HS]

    • Contact Person: Dr. Steffen Bartsch
    • Number of Students: 1
    • Language: German or English

  10. Mental Models in Computer Security [L][HS]

    • Contact Person: Maina Olembo
    • Number of Students: 1
    • Language: English

  11. Organizational security usability [S][HS]

    • Contact Person: Dr. Steffen Bartsch
    • Number of Students: 1-2
    • Language: German or English

Integration into study plan and examination regulations

The seminar is aimed at bachelor's candidates, master's candidates, diploma students, and potential teachers of computer science, WI-degree programs, Electrical Engineering and Information Technology from Semester 5, as well as bachelor's and master's candidates in the field of trusted systems. The seminar is part of the master's program in IT-Security.

- Bachelor computer science (WS 03/04)
- Bachelor computer science (WS 04/05)
- Bachelor computer science (WS 07/08)
- Bachelor computer science (WS 09/10)
- Master computer science (WS 04/05)
- Master computer science (WS 09/10)

Internal area for literature

The password-protected area can be reached here. Access credentials will be announced at the preliminary discussion.

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang