Last 7 days
Bookmark and Share    
Peer Reviewed
See detailAn intersectional approach on primary school textbooks
Kerger, Sylvie UL; Brasseur, Laurence

in Kerger, Sylvie; Brasseur, Laurence (Eds.) Gender and Education in Luxembourg and Beyond: Local Challenges and New Perspectives. (in press)

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailAutomated, Cost-effective, and Update-driven App Testing
Ngo, Chanh Duc UL; Pastore, Fabrizio UL; Briand, Lionel UL

in ACM Transactions on Software Engineering and Methodology (in press)

Apps’ pervasive role in our society led to the definition of test automation approaches to ensure their dependability. However, state-of-the-art approaches tend to generate large numbers of test inputs ... [more ▼]

Apps’ pervasive role in our society led to the definition of test automation approaches to ensure their dependability. However, state-of-the-art approaches tend to generate large numbers of test inputs and are unlikely to achieve more than 50% method coverage. In this paper, we propose a strategy to achieve significantly higher coverage of the code affected by updates with a much smaller number of test inputs, thus alleviating the test oracle problem. More specifically, we present ATUA, a model-based approach that synthesizes App models with static analysis, integrates a dynamically-refined state abstraction function, and combines complementary testing strategies, including (1) coverage of the model structure, (2) coverage of the App code, (3) random exploration, and (4) coverage of dependencies identified through information retrieval. Its model-based strategy enables ATUA to generate a small set of inputs that exercise only the code affected by the updates. In turn, this makes common test oracle solutions more cost-effective as they tend to involve human effort. A large empirical evaluation, conducted with 72 App versions belonging to nine popular Android Apps, has shown that ATUA is more effective and less effort-intensive than state-of-the-art approaches when testingApp updates. [less ▲]

Detailed reference viewed: 22 (6 UL)
Full Text
Peer Reviewed
See detailThe generalized internal/external frame of reference model with academic self-concepts, interests, and anxieties in students from different language backgrounds
van der Westhuizen, Lindie UL; Arens, A. Katrin; Greiff, Samuel UL et al

in Contemporary Educational Psychology (in press)

Student motivation and affect play an important role in successful language learning. To investigate the formation of language learning motivation and affect, this study extended the generalized internal ... [more ▼]

Student motivation and affect play an important role in successful language learning. To investigate the formation of language learning motivation and affect, this study extended the generalized internal/external frame of reference (GI/E) model framework to multiple languages (German and French, along with math) and multiple motivational-affective outcomes (academic self-concept, interest, and anxiety). We examined whether social and dimensional comparisons play similar roles in the formation of students’ self-concepts, interests, and anxieties concerning different languages and whether dimensional comparisons result in contrast or assimilation effects. Moreover, we tested the generalizability of the GI/E model assumptions across students with different language backgrounds. Using a data set comprising virtually all ninth-grade students (N=6275; 48.0% female) from Luxembourg’s multilingual educational system, our findings indicated (1) clear contrast effects in the formation of self-concept and interest in math, German, and French, and (2) a combination of contrast, assimilation, and no effects in the formation of anxiety in math, German, and French. Using a subsample of 5837 students with valid language information (48.0% female), invariance tests demonstrated that the GI/E achievement–outcome relations operated equivalently across students from different home language backgrounds. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailMarital Patterns and Income Inequality
Dupuy, Arnaud UL; Weber, Simon

in Economica (in press)

Detailed reference viewed: 40 (2 UL)
Full Text
Peer Reviewed
See detailNIKE from Affine Determinant Programs
Barthel, Jim Jean-Pierre UL; Rosie, Razvan UL

in Qiong, Huang; Yu, Yu (Eds.) Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

A multi-party non-interactive key-exchange (NIKE) scheme enables N users to securely exchange a secret key K in a non-interactive manner. It is well-known that NIKE schemes can be obtained assuming the ... [more ▼]

A multi-party non-interactive key-exchange (NIKE) scheme enables N users to securely exchange a secret key K in a non-interactive manner. It is well-known that NIKE schemes can be obtained assuming the existence of indistinguishability obfuscation (iO). In this work, we revisit the original, iO-based, provably-secure NIKE construction by Boneh and Zhandry, aiming to simplify it. The core idea behind our protocol is to replace the functionality of the obfuscator with the one of an affine determinant program (ADP). Although ADPs have been designed with the purpose of attaining indistinguishability obfuscation, such implication is left open for general circuits. The ingredients enabling to prove the security of our scheme stem into a more careful analysis of the branching programs needed to build ADPs. In particular, we show: 1) An intuitive indistinguishability notion defined for ADPs of puncturable pseudorandom functions (PRFs) is sufficient to prove security for NIKE. 2) A set of simple conditions based on ADP's branching program topology that are sufficient for proving indistinguishability of ADPs. We leave open the question of finding ADPs satisfying them. [less ▲]

Detailed reference viewed: 48 (4 UL)
Full Text
Peer Reviewed
See detailPartitioned Searchable Encryption
Barthel, Jim Jean-Pierre UL; Beunardeau, Marc; Rosie, Razvan et al

in Qiong, Huang; Yu, Yu (Eds.) Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the ... [more ▼]

Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the search/update queries. In this work we put forth a new flavour of symmetric searchable encryption (SSE): Partitioned SSE is meant to capture the cases where the search rights must be partitioned among multiple individuals. We motivate through compelling examples the practical need for such a notion and discuss instantiations based on functional encryption and trapdoor permutations. First we leverage the power of functional encryption (FE). Our construction follows the general technique of encrypting the set of keywords and the presumably larger datafiles separately, a keyword acting as a ``pointer'' to datafiles it belongs to. To improve on the constraint factors (large ciphertext, slow encryption/decryption procedures) that are inherent in FE schemes, the keyword check is done with the help of a Bloom filter -- one per datafile: the crux idea is to split the filter into buckets, and encrypt each bucket separately under an FE scheme. Functional keys are given for binary \masks checking if relevant positions are set to 1 inside the underlying bit-vector of the Bloom filter. The second construction we present achieves forward security and stems from the scheme by Bost in CCS'16. We show that a simple tweak of the original construction gives rise to a scheme supporting updates in the partitioned setting. Moreover, the constructions take into account the possibility that some specific users are malicious while declaring their search results. [less ▲]

Detailed reference viewed: 124 (1 UL)
Full Text
Peer Reviewed
See detailOn the (M)iNTRU assumption in the integer case
Barthel, Jim Jean-Pierre UL; Müller, Volker UL; Rosie, Razvan UL

in Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous NTRU (iNTRU) assumption and its matrix version MiNTRU ... [more ▼]

In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous NTRU (iNTRU) assumption and its matrix version MiNTRU. In this work, we break the integer case of the iNTRU assumption through elementary lattice reduction, and we describe how the attack might be generalized to polynomial rings and to the low dimensional MiNTRU assumption with small noise. [less ▲]

Detailed reference viewed: 105 (10 UL)
Peer Reviewed
See detailPerceptual approaches to the study of German
Purschke, Christoph UL

in Bousquette, Joshua; Pickl, Simon (Eds.) The Oxford Handbook of the German Language (in press)

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailA Note on the Estimation of Job Amenities and Labor Productivity
Dupuy, Arnaud UL; Galichon, Alfred

in Quantitative Economics (in press)

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailLife Satisfaction and the Human Development Index Across the World
Yin, Remi UL; Lepinteur, Anthony UL; Clark, Andrew et al

in Journal of Cross-Cultural Psychology (in press)

We use annual data on over 150 countries between 2005 and 2018 to look at the relationship between subjective well-being (both cognitive and affective) and the Human Development Index (HDI). The HDI ... [more ▼]

We use annual data on over 150 countries between 2005 and 2018 to look at the relationship between subjective well-being (both cognitive and affective) and the Human Development Index (HDI). The HDI appears to be more closely related to cognitive than affective well-being. We also consider the relationships between the three HDI components (the Income, Health and Education Indices) and well-being, and find that, on average, the Income Index has the strongest predictive power. Importantly, we find that the three HDI components only matter equally in Western and rich countries. Our analysis contributes to the discussion about cultural sensitivity in paradigms of societal development in two ways. We first show that differences in preferences towards development aims exist. Second, we propose a weighting procedure for a culturally-sensitive version of the HDI. [less ▲]

Detailed reference viewed: 74 (7 UL)
Peer Reviewed
See detailMapping knowledge and perceptions of language: societal multilingualism and its socio-pragmatic grounding
Purschke, Christoph UL; Schmalz, Mirjam

in Jucker, Andreas; Hausendorf, Heiko (Eds.) Pragmatics of Space (in press)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailPrenatal exposure to endocrine disrupting chemicals is associated with altered DNA methylation in cord blood
Mattonet, Katharina; Nowack-Weyers, Nikola; Vogel, Vanessa et al

in Epigenetics (in press)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailWell-being and working from home during COVID-19
Schifano, Sonia UL; Clark, Andrew; Greiff, Samuel UL et al

in Information Technology and People (in press)

Purpose – The authors track the well-being of individuals across five European countries during the course of the coronavirus disease 2019 (COVID-19) pandemic and relate their well-being to working from ... [more ▼]

Purpose – The authors track the well-being of individuals across five European countries during the course of the coronavirus disease 2019 (COVID-19) pandemic and relate their well-being to working from home. The authors also consider the role of pandemic-policy stringency in affecting well-being in Europe. Design/methodology/approach – The authors have four waves of novel harmonised longitudinal data in France, Italy, Germany, Spain and Sweden, covering the period May–November 2020. Well-being is measured in five dimensions: life satisfaction, a worthwhile life, loneliness, depression and anxiety. A retrospective diary indicates whether the individual was working in each month since February 2020 and if so whether at home or not at home. Policy stringency is matched in per country at the daily level. The authors consider both cross- section and panel regressions and the mediating and moderating effects of control variables, including household variables and income. Findings – Well-being among workers is lower for those who work from home, and those who are not working have the lowest well-being of all. The panel results are more mitigated, with switching into working at home yielding a small drop in anxiety. The panel and cross-section difference could reflect adaptation or the selection of certain types of individuals into working at home. Policy stringency is always negatively correlated with well-being. The authors find no mediation effects. The well-being penalty from working at home is larger for the older, the better-educated, those with young children and those with more crowded housing. Originality/value – The harmonised cross-country panel data on individuals’ experiences during COVID-19 are novel. The authors relate working from home and policy stringency to multiple well-being measures. The authors emphasise the effect of working from home on not only the level of well-being but also its distribution. [less ▲]

Detailed reference viewed: 98 (12 UL)
Full Text
Peer Reviewed
See detailModeling Data Protection and Privacy: Application and Experience with GDPR
Torre, Damiano UL; Alferez, Mauricio UL; Soltana, Ghanem UL et al

in Software and Systems Modeling (in press)

In Europe and indeed worldwide, the Gen- eral Data Protection Regulation (GDPR) provides pro- tection to individuals regarding their personal data in the face of new technological developments. GDPR is ... [more ▼]

In Europe and indeed worldwide, the Gen- eral Data Protection Regulation (GDPR) provides pro- tection to individuals regarding their personal data in the face of new technological developments. GDPR is widely viewed as the benchmark for data protection and privacy regulations that harmonizes data privacy laws across Europe. Although the GDPR is highly ben- e cial to individuals, it presents signi cant challenges for organizations monitoring or storing personal infor- mation. Since there is currently no automated solution with broad industrial applicability, organizations have no choice but to carry out expensive manual audits to ensure GDPR compliance. In this paper, we present a complete GDPR UML model as a rst step towards de- signing automated methods for checking GDPR compli- ance. Given that the practical application of the GDPR is infuenced by national laws of the EU Member States,we suggest a two-tiered description of the GDPR, generic and specialized. In this paper, we provide (1) the GDPR conceptual model we developed with complete trace- ability from its classes to the GDPR, (2) a glossary to help understand the model, (3) the plain-English de- scription of 35 compliance rules derived from GDPR along with their encoding in OCL, and (4) the set of 20 variations points derived from GDPR to specialize the generic model. We further present the challenges we faced in our modeling endeavor, the lessons we learned from it, and future directions for research. [less ▲]

Detailed reference viewed: 57 (11 UL)
Full Text
Peer Reviewed
See detailAutomated Reverse Engineering of Role-based Access Control Policies of Web Applications
Le, Ha Thanh UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Journal of Systems and Software (in press)

Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with ... [more ▼]

Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with respect to policy specifications or intended access rights. However, in practice, AC policy specifications are often missing or poorly documented; in some cases, AC policies are hard-coded in business logic implementations. This leads to difficulties in validating the correctness of policy implementations and detecting AC defects. In this paper, we present a semi-automated framework for reverse-engineering of AC policies from Web applications. Our goal is to learn and recover role-based access control (RBAC) policies from implementations, which are then used to validate implemented policies and detect AC issues. Our framework, built on top of a suite of security tools, automatically explores a given Web application, mines domain input specifications from access logs, and systematically generates and executes more access requests using combinatorial test generation. To learn policies, we apply machine learning on the obtained data to characterize relevant attributes that influence AC. Finally, the inferred policies are presented to the security engineer, for validation with respect to intended access rights and for detecting AC issues. Inconsistent and insufficient policies are highlighted as potential AC issues, being either vulnerabilities or implementation errors. We evaluated our approach on four Web applications (three open-source and a proprietary one built by our industry partner) in terms of the correctness of inferred policies. We also evaluated the usefulness of our approach by investigating whether it facilitates the detection of AC issues. The results show that 97.8% of the inferred policies are correct with respect to the actual AC implementation; the analysis of these policies led to the discovery of 64 AC issues that were reported to the developers. [less ▲]

Detailed reference viewed: 62 (5 UL)
Full Text
Peer Reviewed
See detailIncome-related health inequality in urban China (1991-2015): The role of homeownership and housing conditions
Peng, Nie; Clark, Andrew; d'Ambrosio, Conchita UL et al

in Health and Place (in press)

Unprecedented economic growth has been experienced over the several decades worldwide, but such rapid economic growth wasn’t accompanied by equally-substantial improvement in health, especially health ... [more ▼]

Unprecedented economic growth has been experienced over the several decades worldwide, but such rapid economic growth wasn’t accompanied by equally-substantial improvement in health, especially health inequalities between the rich and poor. This study examines the role of housing in income-related health inequalities (income-health gradient) in urban China. We here analyze 1991-2015 China Health and Nutrition Survey data to ask how housing affects income-related health inequalities in urban China. We find pro-poor inequalities in self-reported bad health but pro-rich inequalities in objective bad health (general overweight/obesity, central obesity and high blood pressure). Housing conditions serve to reduce the health gradient, especially for objective health. On the contrary, homeownership exacerbates the health gradient. Improving housing conditions thus appears to be an effective way of reducing the income-health gradient in urban China. [less ▲]

Detailed reference viewed: 16 (0 UL)
Peer Reviewed
See detailEuropäische Grenzraumforschung in Zeiten der Vergrenzung: Problemaufriss und Perspektiven.
Wille, Christian UL

in Brodowski, Dominik; Nesselhauf, Jonas; Weber, Florian (Eds.) Pandemisches Virus – nationales Handeln: Covid-19 und die europäische Idee (in press)

Spätestens seit der Covid-19-Pandemie ist die Rolle von Grenzen, die in den letzten Jahrzehnten an Bedeutung gewonnen haben, nicht mehr zu übersehen. Diese Entwicklung, die sich mühelos auf der globalen ... [more ▼]

Spätestens seit der Covid-19-Pandemie ist die Rolle von Grenzen, die in den letzten Jahrzehnten an Bedeutung gewonnen haben, nicht mehr zu übersehen. Diese Entwicklung, die sich mühelos auf der globalen Ebene rekonstruieren lässt, ist mit dem Virus auch in die europäischen Grenzregionen vorgedrungen. Dort ist die europäische Grenzraumforschung nun mit Phänomenen konfrontiert, mit denen sie sich bisher kaum auseinandergesetzt hat. Der Beitrag wendet sich solchen Phänomenen zu und arbeitet exemplarisch das Zusammenspiel von Ver- und Entgrenzungsprozessen im Kontext des Covidfencing heraus. Dafür werden soziale Aushandlungsprozesse der Grenzschließungen in der Großregion SaarLorLux und im deutsch-polnischen Grenzgebiet als „people’s resilience“ thematisiert. Darauf aufbauend werden Überlegungen vorgestellt, wie sich die europäische Grenzraumforschung für Phänomene und Fragestellungen in Zeiten der Vergrenzungen aufstellen kann. Der internationalen Grenzforschung folgend wird eine Erweiterung der Forschungsagenda um alltagskulturelle Fragen vorgeschlagen, die einen Erkenntnisgewinn versprechen. Außerdem wird eine Justierung des verbreiteten Grenzbegriffs vorgeschlagen, um die Grenze als Gegenstand alltagskultureller Aushandlungen erschließbar zu machen. [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailStatus and Enforceability of EU International Agreements within the Domestic Legal Systems of the Member States: Kupferberg
Neframi, Eleftheria UL

in Wessel, Ramses; Butler, Graham (Eds.) EU External Relations Law: The Cases in Context (in press)

Detailed reference viewed: 10 (0 UL)