The ATMODAT Standard enhances FAIRness of Atmospheric Model data
1
Citation
0
Reference
10
Related Paper
Citation Trend
Abstract:
Earth and Space Science Open Archive posterOpen AccessYou are viewing the latest version by default [v1]The ATMODAT Standard enhances FAIRness of Atmospheric Model dataAuthorsDanielHeydebreckAmandineKaiserAnetteGanskeiDAngelinaKraftHeinkeSchluenzeniDVivienVossiDSee all authors Daniel HeydebreckGerman Climate Computing Centre (DKRZ)view email addressThe email was not providedcopy email addressAmandine KaiserGerman Climate Computing Centre (DKRZ)view email addressThe email was not providedcopy email addressAnette GanskeiDCorresponding Author• Submitting AuthorTechnische Informationsbibliothek (TIB)iDhttps://orcid.org/0000-0003-1043-4964view email addressThe email was not providedcopy email addressAngelina KraftTechnische Informationsbibliothek (TIB)view email addressThe email was not providedcopy email addressHeinke SchluenzeniDUniversity of Hamburg (UHH)iDhttps://orcid.org/0000-0002-5711-547Xview email addressThe email was not providedcopy email addressVivien VossiDUniversity of Hamburg (UHH)iDhttps://orcid.org/0000-0001-7329-8192view email addressThe email was not providedcopy email addressKeywords:
Email authentication
Electronic mail
The explosive growth in unwanted email has prompted the development of techniques for the rejection of email, intended to shield recipients from the onerous task of identifying the legitimate email in their inboxes amid a sea of spam. Unfortunately, widely used content-based filtering systems have converted the spam problem into a false positive one: email has become unreliable. Email acceptance techniques complement rejection ones; they can help prevent false positives by filing email into a user's inbox before it is considered for rejection. Whitelisting, whereby recipients accept email from some set of authorized senders, is one such acceptance technique. We present Reliable Email (RE:), a new whitelisting system that incurs zero false positives among socially connected users. Unlike previous whitelisting systems, which require that whitelists be populated manually, RE: exploits friend-of-friend relationships among email correspondents to populate whitelists automatically. To do so, RE: permits an email's recipient to discover whether other email users have whitelisted the email's sender, while preserving the privacy of users' email contacts with cryptographic private matching techniques. Using real email traces from two sites, we demonstrate that RE: renders a significant fraction of received email reliable. Our evaluation also shows that RE: can prevent up to 88% of the false positives incurred by a widely deployed email rejection system, at modest computational cost.
Email authentication
Opt-in email
Electronic mail
Communication source
Phishing
Cite
Citations (134)
Electronic mail, email, is one of the most widespread computer applications today.While email in general is very popular among its users, there are also drawbacks withemail usage: an increasing amount of messages that overwhelm users, systems that aretoo complex for naive users and at the same time do not support the needs of experiencedusers.In order to answer the main research question “Which design solutions couldimprove the situation of individual email users in a working context when it comes tocommunication and handling large numbers of incoming and stored email messages?”three studies conducted in email users’ working environment are described. The studiedorganisations are one academic research laboratory, one technical company, andone primary medical service organisation. The studies are focused on email usage,organisation of email messages, novice versus experienced users’ needs, managers’email usage, and information and communication overflow.The results indicate that the different strategies used to handle email are a matter ofa balance between advantages and disadvantages of these strategies. The choicebetween them is depending on the users’ total work situation and cannot be understoodby investigating the email communication alone.One advantage of email is the cognitive comfort it brings to its users by liberatingthem from thinking about tasks that can be solved by sending an email message, butthis advantage disappears when the sender cannot trust that the receiver will act uponthe message.Users develop their handling of email with experience and work position. Themedia that managers use to handle the increased communication that follows with ahigher position are email and meetings. One habit that do not change with position isto allow incoming messages to interrupt other work tasks, despite the asynchronousnature of email. This is particularly remarkable for managers who often complain thatthey need more uninterrupted time. The interruptions may partly be attributed to thelack of functionality in email systems to adapt the interfaces to the users’ work habits.In this case incoming messages result in a signal regardless the importance of them.Email is a part of an information and communication flow. Some users have problemshandling this flow. Overflow problems could be diminished by making senders ofmessages more aware of the receivers’ communicative situation. Email systems couldprovide feedback to senders of messages based on the receivers’ perception of his/hersituation.One of the studies indicates that it may be even more complicated to replace an oldemail system than introducing an email system for the first time in an organisation.The investment experienced users have made in the old system may be substantial.A model of time usage for organisation of email messages is also presented in orderto compare different strategies.Several design solutions are suggested with respect to folder usage, sorting emailmessages into folders, reducing the number of stored messages, and tailoring the emailsystem to the user’s work habits.
Communication source
Electronic mail
Email authentication
Opt-in email
Cite
Citations (59)
Earth and Space Science Open Archive This preprint has been submitted to and is under consideration at The Plant Genome. ESSOAr is a venue for early communication or feedback before peer review. Data may be preliminary.Learn more about preprints preprintOpen AccessYou are viewing the latest version by default [v1]Genomic prediction of tocochromanols in exotic-derived maizeAuthorsLaura E.Tibbs-CortesiDTingtingGuoXianranLiRyokeiTanakaAdam EVanousDavidPetersCandiceGardnerMariaMagallanes-LundbackNicholas TDeasonDeanDellapennaMichael AGoreiDJianmingYuiDSee all authors Laura E. Tibbs-CortesiD• Submitting AuthorIowa State UniversityiDhttps://orcid.org/0000-0003-3188-6820view email addressThe email was not providedcopy email addressTingting GuoHubei Hongshan LaboratoryHuazhong Agricultural Universityview email addressThe email was not providedcopy email addressXianran LiUSDA-ARSview email addressThe email was not providedcopy email addressRyokei TanakaCornell Universityview email addressThe email was not providedcopy email addressAdam E VanousUSDA-ARSview email addressThe email was not providedcopy email addressDavid PetersUSDA-ARSview email addressThe email was not providedcopy email addressCandice GardnerUSDA-ARSview email addressThe email was not providedcopy email addressMaria Magallanes-LundbackMichigan State Universityview email addressThe email was not providedcopy email addressNicholas T DeasonMichigan State Universityview email addressThe email was not providedcopy email addressDean DellapennaMichigan State Universityview email addressThe email was not providedcopy email addressMichael A GoreiDCornell UniversityiDhttps://orcid.org/0000-0001-6896-8024view email addressThe email was not providedcopy email addressJianming YuiDCorresponding AuthorIowa State UniversityiDhttps://orcid.org/0000-0001-5326-3099view email addressThe email was not providedcopy email address
Email authentication
Electronic mail
Opt-in email
Cite
Citations (2)
Earth and Space Science Open Archive PosterOpen AccessYou are viewing the latest version by default [v1]How Alaska’s Barry Arm Can Help Us Prepare for Climate Change HazardsAuthorsBretwoodHigmaniDChadBriggsJeffreyCoeChunliDaiAnjaDufresneJeffreyFreymuelleriDMartenGeertsemaPeterHaeusslerMylene FabienneJacquemartMicheleKoppesAnnaLiljedahlPatrickLynettDmitryNicolskyLaurenSchaeferMelissaWard JonesRobertWeissMichaelWestiDGabrielWolkenSee all authors Bretwood HigmaniDCorresponding Author• Submitting AuthorOrganization Not ListediDhttps://orcid.org/0000-0002-8462-3656view email addressThe email was not providedcopy email addressChad BriggsUniversity of Alaska Anchorageview email addressThe email was not providedcopy email addressJeffrey CoeUS Geological Surveyview email addressThe email was not providedcopy email addressChunli DaiOhio State University Main Campusview email addressThe email was not providedcopy email addressAnja DufresneRWTH-Aachen Universityview email addressThe email was not providedcopy email addressJeffrey FreymuelleriDMichigan State UniversityiDhttps://orcid.org/0000-0003-0614-0306view email addressThe email was not providedcopy email addressMarten GeertsemaFLNROview email addressThe email was not providedcopy email addressPeter HaeusslerUSGSview email addressThe email was not providedcopy email addressMylene Fabienne JacquemartWSL Institute for Snow and Avalanche Research SLFview email addressThe email was not providedcopy email addressMichele KoppesUniversity of British Columbiaview email addressThe email was not providedcopy email addressAnna LiljedahlWoods Hole Research Centerview email addressThe email was not providedcopy email addressPatrick LynettUniversity of Southern Californiaview email addressThe email was not providedcopy email addressDmitry NicolskyUniversity of Alaska Fairbanksview email addressThe email was not providedcopy email addressLauren SchaeferUSGS Geologic Hazards Science Centerview email addressThe email was not providedcopy email addressMelissa Ward JonesWoods Hole Research Centerview email addressThe email was not providedcopy email addressRobert WeissVirginia Techview email addressThe email was not providedcopy email addressMichael WestiDUniv Alaska FairbanksiDhttps://orcid.org/0000-0003-4855-9295view email addressThe email was not providedcopy email addressGabriel WolkenUniversity of Alaska Fairbanksview email addressThe email was not providedcopy email address
Email authentication
Electronic mail
Opt-in email
Cite
Citations (0)
We develop a defence against email bomb attacks, we call EmailGlass. Email bomb is a targeted Denial of Service (DOS) attack during which the email account of a victim is flooded with multiple emails. The emails are sent by legitimate web services which the attackers abuse as reflectors, to reflect unwanted email traffic at victim email accounts.The lack of defences coupled with low costs of the attack and the devastating outcome, make email bomb attack particularly popular. The email bomb attacks do not only pose inconvenience and hinder the ability of victims to function, but can also be used to hide other attacks which take place concurrently.The design of EmailGlass is based on a two year study of the email bomb attack and the relevant actors - the victims and the reflectors. During the study we setup victim email accounts, and rented email bomb attacks on darknet. We analysed the attack traffic that was received on our victim accounts to derive conclusions for development of an effective defence mechanism.
Email authentication
Electronic mail
Opt-in email
Blocking (statistics)
Cite
Citations (2)
Introduction. 1. Stealing Candy from a Baby: How Spammers Harvest Email Addresses. 2. Neither Confirm Nor Deny: How Email Attacks Determine that an Email Address is Active. 3. Bad Things Come in Small Packages: How Viruses are Transmitted Through Email Attachments. 4. Using Email Clients for Good and Evil: Guarding Against Script-Based Viruses and Worms. 5. Would the Real Sender Please Stand Up?: How Spammers Spoof Email Identities. 6. Unwilling Accomplices?: How Spammers Mask their Identities using Email Relaying. 7. Separating the Wheat from the Chaff: Using Filters to Block Unwanted Emails. 8. Don't Send us a Postcard: Insuring that your Email is not Sent in the Clear. 9. You've Got Some Email in my Web Site: Using Web-based Email Services Securely. 10. The Bigger they are, the Harder they Fall: Mitigating Denial of Email Services Attacks. Appendix A. Email Protocols. Appendix B. Popular Email Tools. Appendix C. Email Legal Information.
Email authentication
Communication source
Electronic mail
Opt-in email
Forum spam
Phishing
Cite
Citations (0)
Email authentication
Electronic mail
Opt-in email
Text message
Cite
Citations (1)
The nationally-recognized Susquehanna
Chorale will delight audiences of all
ages with a diverse mix of classic and
contemporary pieces. The ChoraleAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂA¢AÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂs
performances have been described
as AÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂA¢AÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂemotionally unfiltered, honest
music making, successful in their
aim to make the audience feel,
to be moved, to be part of the
performance - and all this while
working at an extremely high
musical level.AÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂA¢AÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂAÂA Experience choral
singing that will take you to new
heights!
Cite
Citations (0)
Email has become one of the most important Internet applications in our daily lives. It has many advantages over the postal mail (paper-based mail). In contrast, Email has faster delivery with no regards to the distance or the place of the originator and the recipient. Therefore, email tends to replace some of the paper-based postal mail services with more efficient and advanced services. In order for the email systems to do the job right, security and protection must be employed in a broader range, especially for those services that require special delivery like certified mail. This paper presents the design of a practical certified exchange of electronic mail protocol that can provide the required proofs for both the originator and recipient against any repudiation.
Electronic mail
Email authentication
Opt-in email
Cite
Citations (8)