Advertisement

Datenschutz und Datensicherheit - DuD

, Volume 40, Issue 5, pp 283–289 | Cite as

Unpopuläre E-Mail-Verschlüsselung – Auflösung des Henne-Ei-Problems

Konzepte für anwenderfreundliche E-Mail-Sicherheit
  • Bernhard Esslinger
  • Ludger Schmidt
  • Benjamin Strenge
  • Arno Wacker
Schwerpunkt

Abstract

E-Mail-Verschlüsselung könnte längst flächendeckend Verwendung finden. Der Beitrag gibt eine Antwort auf die Frage, warum dies nicht der Fall ist–und macht Vorschläge, was getan werden sollte, um dies zu ändern.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. [1]
    S/MIME und OpenPGP: RFC 3851–Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification, RFC 5751–Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification, RFC 3156–MIME Security with OpenPGP.Google Scholar
  2. [2]
    Garfinkel, Simson L.; Margrave, David; Schiller, Jeffrey I.; Nordlander, Erik; Miller, Robert C. (2005): How to make secure E-Mail easier to use. In: Gerrit van der Veer und Carolyn Gale (Hg.): CHI. Portland, 2005. S. 701–710.Google Scholar
  3. [3]
    Gross, Joshua B.; Rosson, Mary Beth: Looking for Trouble: Understanding End-user Security Management. In: Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology. CHIMIT’ 07, ACM, New York, 2007. Online verfügbar unter http://doi.acm.org/10.1145/1234772.1234786Google Scholar
  4. [4]
    Straub, Tobias: Usability Challenges of PKI. Dissertation. TU Darmstadt, 2006.Google Scholar
  5. [5]
    Whitten, Alma; Tygar, J. Doug: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, 1999.Google Scholar
  6. [6]
    Sheng, Steve; Broderick, Levi; Koranda, Colleen Alison; Hyland, Jeremy J.: Why Johnny still can’t encrypt: evaluating the usability of E-Mail encryption software. In: Symposium On Usable Privacy and Security, 2006.Google Scholar
  7. [7]
    Fry, Ann; Chiasson, Sonia; Somayaji, Anil: Not sealed but delivered: The (un) usability of s/mime today. In: Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA’12), Albany, NY2012 2006..Google Scholar
  8. [8]
    Esslinger, Bernhard: Sichere E-Mail mit S/MIME. In: Datenschutz und Datensicherheit–DuD 38 (5/2014), S. 305-313. DOI: 10.1007/s11623-014-0116-7CrossRefGoogle Scholar
  9. [9]
    DeWitt, Alexander John Anthony George: Usability Issues with Security of Electronic Mail. Dissertation. Brunel University, 2007.Google Scholar
  10. [10]
    Roth, Volker; Straub, Tobias; Richter, Kai: Security and usability engineering with particular attention to electronic mail. In: International Journal of Human-Computer Studies 63 (1-2), 2005, S. 51–73. DOI: 10.1016/j.ijhcs.2005.04.015CrossRefGoogle Scholar
  11. [11]
    Kapadia, Apu: A Case (Study) For Usability in Secure E-Mail Communication. In: IEEE Security & Privacy Mag. 5 (2), 2007, S. 80–84. DOI: 10.1109/MSP.2007.25CrossRefGoogle Scholar
  12. [12]
    Farrell, Stephen: Why Don’t We Encrypt Our E-Mail? In: IEEE Internet Computing 13 (1), 2009, S. 82–85. DOI: 10.1109/MIC.2009.25CrossRefGoogle Scholar
  13. [13]
    Whitten, Alma: Making security usable. Carnegie Mellon University, 2004.Google Scholar
  14. [14]
    West, Ryan: The Psychology of Security. In: Commun. ACM 51 (4), 2008, S. 34–40. DOI: 10.1145/1330311.1330320CrossRefGoogle Scholar
  15. [15]
    Wash, Rick; Rader, Emilee (2011): Influencing Mental Models of Security: A Research Agenda. In: Proceedings of the 2011 Workshop on New Security Paradigms Workshop 2011. ACM, New York, S. 57–66. Online verfügbar unter http://doi.acm.org/10.1145/2073276.2073283CrossRefGoogle Scholar
  16. [16]
    Balfanz, Dirk; Durfee, Glenn; Grinter, Rebecca E.; Smetters, D. K.: In Search of Usable Security: Five Lessons from the Field. In: IEEE Security and Privacy 2 (5), 2004, S. 19–24. DOI: 10.1109/MSP.2004.71CrossRefGoogle Scholar
  17. [17|]
    Johnston, J.; Eloff, J. H. P.; Labuschagne, L.: Features: Security and Human Computer Interfaces. In: Computers and Security 22 (8), 2003, S. 675–684. DOI: 10.1016/S0167-4048(03)00006-3CrossRefGoogle Scholar
  18. [18]
    Nurse, Jason R. C.; Creese, Sadie; Goldsmith, Michael; Lamberts, Koen: Guidelines for usable cybersecurity: Past and present. In: 2011 International Workshop on Cyberspace Safety and Security (CSS). Milan, S. 21-26.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden 2016

Authors and Affiliations

  • Bernhard Esslinger
    • 1
  • Ludger Schmidt
    • 2
  • Benjamin Strenge
    • 2
  • Arno Wacker
    • 3
  1. 1.Bad RappenauGermany
  2. 2.KasselGermany
  3. 3.FellbachGermany

Personalised recommendations