Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

CapDesk research project

capture, biometric authentication

Cascading Style Sheets (CSS)

case studies

     anonymizing networks

         Mixminion

     Casca, work group applications, iPKIs and

     Chameleon interface development

     Faces software prototype

     JAP

     KaZaA user study

     network intrusion alert

     Network-in-a-Box

     PGP v5.0

     PKI deployment for wireless networks

     privacy policy management tool

     privacy, designing for

     security administration

     security application, usability of

     sensitive information on discarded drives

     SpoofGuard

     Tor

     Web, usable access control for

     Windows XP Service Pack 2

CDNs (content distribution networks)

cell phones

     context-aware

     disclosure function 2nd

     disposable

     exploiting plausible deniability

CERT (Computer Emergency Readiness Team)

certificate authorities, iPKIs and

challenge questions systems

     criteria for building/evaluating

     designing

Chameleon

     email attachments, security and

     interface

         development

         X Windows implementation

     low-fidelity prototyping

     network access

     roles

     simplicity of interface

     usability/security

chat rooms, security administrators, communications among

chattr command (Linux)

Children Online Privacy Protection Act (COPPA)

cipher utility (Windows)

classification, biometric authentication

clickstreams

     tracking, web bugs enabling

code samples, as vulnerability detection tool 2nd

coercion

Coffetti, Paolo

cognitive walkthrough, usability technique

     KaZaA user study, results of

     PGP v5.0

collection limitation, privacy criterion for challenge questions system

communications

     Chameleon 2nd

     secure interaction design

     security administrators, coordinating efforts of 2nd

community, sense of, trust design

Compatible Time Sharing System (CTSS)

competence, informed consent model

comprehension, informed consent model

Computer Emergency Readiness Team (CERT)

Confab system

confidentiality

     authentication security

configuration

     detecting changes in

     gesture-based approach to

     iPKIs and

     KaZaA user study

     options, Privacy Bird

     privacy system design, emphasizing user action

consent dialogs, trust issues and

content distribution networks (CDNs)

contextual design

controlled answers/questions, challenge questions

convenience, authentication accessibility

Cookie-Watcher application

cookies 2nd 3rd

     adware and

     as hidden tracking devices

     blocking

     development of

     handling, informed consent

     just-in-time interventions

     managing

         Privacy Bird and

         supporting information flow

         with Acumen

     security by designation

     third-party

     web site practices, P3P compact policies

COPPA (Children Online Privacy Protection Act)

cost to user (CUE)

cost to user to authenticate (CUA)

cost, authentication evaluation criterion

     CUA/CUE, keystroke biometrics

     environmental considerations

     online banking example

Coventry, Lynne

cracking attacks

     crackability, authentication security

     frequent login attempts and

Cranor, Lorrie Faith

credentials, recovering with challenge questions

criteria for evaluating/selecting authentication

     accessibility

     biometric systems

     challenge question systems

     cost

     memorability

     security

     trustworthiness of technology

     usability

         portable devices

         smart cards/USB tokens

cryptography

     keystroke biometrics

CSCW (Computer-Supported Cooperative Work) 2nd

     privacy issues

CSI/FBI Computer Crime and Security Survey

CSS (Cascading Style Sheets)

CTSS (Compatible Time Sharing System)

CUA (cost to user to authenticate)

CUE (cost to user)

cued recall 2nd

cultural passwords

     abundance of

     cued recall

     inclusivity

     meaningfulness of

Cypherpunk networks

Категории